An intrusion intention analysis algorithm based on attack graph

被引:0
|
作者
Zhu Z. [1 ]
Chai G. [2 ]
机构
[1] Equipment and Training Management Center (Information Center), Quzhou College of Technology, Quzhou
[2] College of Electrical and Information Engineering, Quzhou University, Quzhou
关键词
Attack graph; Intrusion intention; Network security; Recognition algorithm;
D O I
10.46300/9106.2021.15.71
中图分类号
学科分类号
摘要
The discovery of intrusion intention is one of the challenging tasks faced by network security managers. To detect intrusion detections, this paper presents a domain-device attack graph, and collects and analyzes the underlying data of the network topology. On this basis, the attack graph Map was quantified by the Bayesian theory. The minimum weight spanning tree (Min-WFS) algorithm was adopted to automatically recognize the calculation cost of key devices in the network topology, providing an important basis for network maintenance. Experimental results show that the intrusion intentions can be effectively identified with the aid of the quantified domain-device attack graph Map, and this identification method is easy to implement. © 2021, North Atlantic University Union NAUN. All rights reserved.
引用
收藏
页码:643 / 650
页数:7
相关论文
共 50 条
  • [41] Graph-based analysis of evolutionary algorithm
    Walczak, Z
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2005, : 329 - 338
  • [42] A network attack discovery algorithm based on unbalanced sampling vehicle evolution strategy for intrusion detection
    Yong-xiong Z.
    Liang-ming W.
    Lu-xia Y.
    International Journal of Computers and Applications, 2020, 42 (01) : 84 - 92
  • [43] Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks
    Han, Guangjie
    Li, Xun
    Jiang, Jinfang
    Shu, Lei
    Lloret, Jaime
    COMPUTER JOURNAL, 2015, 58 (06): : 1280 - 1292
  • [44] Large scale distributed intrusion detection framework based on attack strategy analysis
    Applied Research and Technology, Boeing Company, M/S 7L-20, P.O. Box 3707, Seattle, WA 98124-2207, United States
    Comput. Networks, 23 (2465-2475):
  • [45] Interpreting and predicting social commerce intention based on knowledge graph analysis
    Liu Yuan
    Zhao Huang
    Wei Zhao
    Pavel Stakhiyevich
    Electronic Commerce Research, 2020, 20 : 197 - 222
  • [46] A large scale distributed intrusion detection framework based on attack strategy analysis
    Huang, MY
    Jasper, RJ
    Wicks, TM
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24): : 2465 - 2475
  • [47] Interpreting and predicting social commerce intention based on knowledge graph analysis
    Yuan, Liu
    Huang, Zhao
    Zhao, Wei
    Stakhiyevich, Pavel
    ELECTRONIC COMMERCE RESEARCH, 2020, 20 (01) : 197 - 222
  • [48] Real-time Network Attack Intention Recognition Algorithm
    Hui, Qiu
    Kun, Wang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 51 - 61
  • [49] Power Analysis Attack Based on FCM Clustering Algorithm
    Shen, Gao
    Zhang, Qiming
    Tang, Yongkang
    Li, Shaoqing
    Zhang, Ruonan
    14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018), 2018, 306 : 558 - 567
  • [50] Attack Intention Analysis Model for Network Forensics
    Rasmi, M.
    Jantan, Aman
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411