An intrusion intention analysis algorithm based on attack graph

被引:0
|
作者
Zhu Z. [1 ]
Chai G. [2 ]
机构
[1] Equipment and Training Management Center (Information Center), Quzhou College of Technology, Quzhou
[2] College of Electrical and Information Engineering, Quzhou University, Quzhou
关键词
Attack graph; Intrusion intention; Network security; Recognition algorithm;
D O I
10.46300/9106.2021.15.71
中图分类号
学科分类号
摘要
The discovery of intrusion intention is one of the challenging tasks faced by network security managers. To detect intrusion detections, this paper presents a domain-device attack graph, and collects and analyzes the underlying data of the network topology. On this basis, the attack graph Map was quantified by the Bayesian theory. The minimum weight spanning tree (Min-WFS) algorithm was adopted to automatically recognize the calculation cost of key devices in the network topology, providing an important basis for network maintenance. Experimental results show that the intrusion intentions can be effectively identified with the aid of the quantified domain-device attack graph Map, and this identification method is easy to implement. © 2021, North Atlantic University Union NAUN. All rights reserved.
引用
收藏
页码:643 / 650
页数:7
相关论文
共 50 条
  • [21] An Improved Algorithm for Generation of Attack Graph Based on Virtual Performance Node
    Zhao, Yihuan
    Wang, Zulin
    Zhang, Xudong
    Zheng, Jing
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 466 - 469
  • [22] Algorithm of generating host-based attack graph for overall network
    Zhong S.
    Xu G.
    Yang Y.
    Yao W.
    Yang Y.
    Advances in Information Sciences and Service Sciences, 2011, 3 (08): : 104 - 110
  • [23] From attack graph analysis to attack function analysis
    Zenitani, Kengo
    INFORMATION SCIENCES, 2023, 650
  • [24] Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection
    Kuroki, Kotomi
    Kanemoto, Yo
    Aoki, Kazufumi
    Noguchi, Yasuhiro
    Nishigaki, Masakatsu
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1510 - 1515
  • [25] A data mining approach to generating network attack graph for intrusion prediction
    Li, Zhi-tang
    Lei, Jie
    Wang, Li
    Li, Dong
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2007, : 307 - 311
  • [26] NETWORK SECURITY ANALYSIS BASED ON HOST-BASED ATTACK GRAPH
    Zhong, Shangqin
    Yao, Wenbin
    Ge, Haihui
    Yang, Yixian
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 88 - +
  • [27] Network Forensics Attack-Analysis Model Based on Similarity of Intention
    Rasmi, Mohammad
    Jantan, Aman
    Ahmed, Abdulghani Ali
    2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 110 - 113
  • [28] Recognizing Intrusive Intention and Assessing Threat Based on Attack Path Analysis
    Peng Wu
    Yao Shuping
    Chen Junhua
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 450 - +
  • [29] Evolutionary Algorithm Based Immune Intrusion Analysis Engine
    Zhou, Xuanwu
    Yang, Xiaoyuan
    Wei, Ping
    Hu, Yupu
    ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 7, PROCEEDINGS, 2008, : 138 - +
  • [30] An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis
    Xie, Hui
    Lv, Kun
    Hu, Changzhen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 307 - 315