An intrusion intention analysis algorithm based on attack graph

被引:0
|
作者
Zhu Z. [1 ]
Chai G. [2 ]
机构
[1] Equipment and Training Management Center (Information Center), Quzhou College of Technology, Quzhou
[2] College of Electrical and Information Engineering, Quzhou University, Quzhou
关键词
Attack graph; Intrusion intention; Network security; Recognition algorithm;
D O I
10.46300/9106.2021.15.71
中图分类号
学科分类号
摘要
The discovery of intrusion intention is one of the challenging tasks faced by network security managers. To detect intrusion detections, this paper presents a domain-device attack graph, and collects and analyzes the underlying data of the network topology. On this basis, the attack graph Map was quantified by the Bayesian theory. The minimum weight spanning tree (Min-WFS) algorithm was adopted to automatically recognize the calculation cost of key devices in the network topology, providing an important basis for network maintenance. Experimental results show that the intrusion intentions can be effectively identified with the aid of the quantified domain-device attack graph Map, and this identification method is easy to implement. © 2021, North Atlantic University Union NAUN. All rights reserved.
引用
收藏
页码:643 / 650
页数:7
相关论文
共 50 条
  • [11] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [12] Attack Intent Analysis Method Based on Attack Path Graph
    Li, Shijin
    Zhu, Minchen
    Qiu, Yanbin
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 27 - 31
  • [13] Automatic recognition model of intrusive intention based on three layers attack graph
    Luo, Zhi-Yong, 1600, Editorial Board of Jilin University (44):
  • [14] Hierarchical Graph Neuron Scheme in Classifying Intrusion Attack
    Essra, Aulia
    Sitompul, Opim Salim
    Nasution, Benny Benyamin
    Rahmat, Romi Fadillah
    2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017, : 438 - 443
  • [15] Research on Intrusion Prediction Algorithm Based on Association Attack Diagram ASAD
    He, Xiao
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 811 - 815
  • [16] Design of Network Attack Intrusion Detection System Based on Improved FWA Algorithm
    Chang, Qingsong
    Feng, Weiyan
    Wang, Xingguo
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 191 - 200
  • [17] A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution
    Easttom, Chuck
    INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 550 - 580
  • [18] SAGE: Intrusion Alert-driven Attack Graph Extractor
    Nadeem, Azqa
    Verwer, Sicco
    Yang, Shanchieh Jay
    2021 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC 2021), 2021, : 36 - 41
  • [19] Alert Correlation Analysis Based on Attack Path Graph
    Zhang, Daojuan
    Qian, Kexiang
    Zhang, Peng
    Mao, Shu
    Wu, Hongbin
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [20] Attack Group Analysis and Identification based on Heterogeneous Graph
    Han, Taehyun
    Hwang, Sangyeon
    Lee, Tae-jin
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,