Intelligent Security and Risk Analysis in Network Systems

被引:0
|
作者
Mohammadian, Masoud [1 ]
机构
[1] Univ Canberra, Sch Informat Syst & Accounting, Canberra, ACT 2606, Australia
关键词
Data and Network Security; Attack Graphs; Attack Paths; Fuzzy Logic; Decision Making; Genetic Algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security architects devote a considerable time and efforts in improving the security of their data and networks. Attack graph are graphical representation of networks that can assist in documenting risks in network systems. Attack graphs need to be analysed and tested to remove security risks in a network. All comprising paths identified on an attack graph are listed for close attention and consideration of how to protect against possible attacks. There is a need for an automated system that can generate and evaluate attack paths and provide security architects with decision making tools that provides them with details of paths that an attacker may take to attack a network and cause damage and security breaches in their networks. Such an automated system can provide paths that can cause the most undesirable attacks. In this research paper an automated system using Fuzzy Cognitive Maps developed by Mohammadian [3] for identifying attack paths from attack graphs are presented. A novel decision making approach to determine time delay for an attacker to reach resources in a network is considered. A multilayer Fuzzy Logic is employed for the development of calculation of time delay for an attacker to reach a resource once it has access to a network.
引用
收藏
页码:825 / 830
页数:6
相关论文
共 50 条
  • [31] An Intelligent Approach to Automated Operating Systems Log Analysis for Enhanced Security
    Johnphill, Obinna
    Sadiq, Ali Safaa
    Kaiwartya, Omprakash
    Aljaidi, Mohammad
    INFORMATION, 2024, 15 (10)
  • [32] Intelligent Safety and Security Systems in Automobiles
    Raghavan, Raja M.
    Bhuvaneswari, N. S.
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGICAL INNOVATIONS IN ICT FOR AGRICULTURE AND RURAL DEVELOPMENT TIAR 2015, 2015, : 188 - 192
  • [33] Risk management systems with intelligent data analysis - Overview
    Yamaguchi, Takahira
    NEW FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2006, 4012 : 423 - 424
  • [34] An Autonomous Robot for Intelligent Security Systems
    Hasan, Roza
    Hussain, Shaik Asif
    Nizamuddin, Shaikh Azeemuddin
    Mahmood, Salman
    2018 9TH IEEE CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC2018), 2018, : 201 - 206
  • [35] Emerging intelligent information security systems
    Vigilar, United States
    Sci. Comput., 2006, 2 (26-27):
  • [36] Security Breach and Forensics in Intelligent Systems
    Devi, M. S. Girija
    Nene, Manisha J.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 349 - 360
  • [37] Managing Security in Intelligent Transport Systems
    Lang, Ulrich
    Schreiner, Rudolf
    2015 IEEE 18TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, : 48 - 53
  • [38] Siamese neural network for intelligent information security control in multi-robot systems
    Utkin L.V.
    Zaborovsky V.S.
    Popov S.G.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 881 - 887
  • [39] Intelligent Analysis and Prediction of Computer Network Security Logs Based on Deep Learning
    Liu, Zhiwei
    Li, Xiaoyu
    Mu, Dejun
    ELECTRONICS, 2024, 13 (22)
  • [40] Intelligent Optimization Method and Network Security Analysis for Power System Active Control
    Ding, Chaojie
    Li, Lanqing
    Zhou, Nan
    Gu, Dongjian
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)