Novel Mechanism of Network Protection against the New Generation of Cyber Attacks

被引:1
|
作者
Milovanov, Alexander [1 ]
Bukshpun, Leonid [1 ]
Pradhan, Ranjit [1 ]
机构
[1] Phys Opt Corp, Torrance, CA 90501 USA
关键词
Cyber security; Intrusion detection; Intrusion protection; Deception;
D O I
10.1117/12.921027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Cyber Resilience: Why Protection against Cyber Attacks is not enough
    Kahrau, Felix
    ATP MAGAZINE, 2021, (11-12): : 32 - 34
  • [2] Protection of industrial controls against advanced cyber attacks
    Erdrich, Andreas
    Biss, Klaus
    Wiesner, Jens
    ATP MAGAZINE, 2020, (09): : 80 - 85
  • [3] Toward an Artificial Immune Server against Cyber Attacks: Enhancement of Protection against DoS attacks
    Tarao, Mitsunobu
    Okamoto, Takeshi
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS: PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE KES-2016, 2016, 96 : 1137 - 1146
  • [4] Main Control Computer Security Model of Closed Network Systems Protection against Cyber Attacks
    Seymen, Bilal
    CYBER SENSING 2014, 2014, 9097
  • [5] Information Protection of Data Processing Center Against Cyber Attacks
    Ogbu, James Onyigwang
    Oksiuk, Alexandr
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 132 - 134
  • [6] Information Protection of Data Processing Center Against Cyber Attacks
    Onyigwang, Ogbu James
    Shestak, Yanina
    Oksiuk, Alexandr
    PROCEEDINGS OF THE 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA STREAM MINING & PROCESSING (DSMP), 2016, : 397 - 400
  • [7] A Heuristic Method for Network Modification against Cyber Epidemic Attacks
    Yan, Dingyu
    Liu, Feng
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 184 - 191
  • [8] INVESTIGATION ON CYBER-ATTACKS AGAINST IN-VEHICLE NETWORK
    Kumar, S. Vishnu
    Mary, G. Aloy Anuja
    Suresh, P.
    Uthirasamy, R.
    2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 305 - 311
  • [9] Novel Defense Mechanism against Data Flooding Attacks in Ad Hoc Network
    Bahaddur, Indira
    Triveni, C. L.
    Srikanth, P. C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [10] Relations of Network Characteristics and Protection Strategies against Attacks
    Tsai, Yihjia
    Yao, Chen-Han
    Huang, Wen-Fa
    Lin, You-Shan
    Chou, Chin-Hou
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 345 - 348