Assessment of Security Threats via Network Topology Analysis: An Initial Investigation

被引:1
|
作者
Trovati, Marcello [1 ]
Thomas, Win [2 ]
Sun, Quanbin [1 ]
Kontonatsios, Georgios [1 ]
机构
[1] Edge Hill Univ, Dept Comp Sci, Ormskirk, England
[2] Gloucestershire Univ, Dept Comp Sci, Cheltenham, Glos, England
关键词
Botnets; Cybersecurity; Network theory;
D O I
10.1007/978-3-319-57186-7_31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computer networks have increasingly been the focus of cyber attack, such as botnets, which have a variety of serious cybersecurity implications. As a consequence, understanding their behaviour is an important step towards the mitigation of such threat. In this paper, we propose a novel method based on network topology to assess the spreading and potential security impact of botnets. Our main motivation is to provide a toolbox to classify and analyse the security threats posed by botnets based on their dynamical and statistical behaviour. This would potentially lead to a better understanding and prediction of cybersecurity issues related to computer networks. Our initial validation shows the potential of our method providing relevant and accurate results.
引用
收藏
页码:416 / 425
页数:10
相关论文
共 50 条
  • [1] Network Security Threats Situation Assessment and Analysis Technology Study
    Cai, Xiangdong
    Zhang, Huanyu
    Li, Tao
    [J]. PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 643 - 646
  • [2] Network Security Threats Situation Assessment and Analysis Technology Study
    Cai, Xiangdong
    Yang Jingyi
    Zhang, Huanyu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 217 - 224
  • [3] The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures
    Lincy, N. L.
    Midhunchakkaravarthy
    [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 107 - 117
  • [4] A Virtual Network Topology Security Assessment Process
    Goyette, R.
    Karmouch, A.
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 974 - 979
  • [5] Problem of Network Security Threats
    Mendyk-Krajewska, Teresa
    Mazur, Zygmunt
    [J]. 3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 436 - 443
  • [6] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [7] Bot armies as threats to network security
    Banks, Sheila B.
    Stytz, Martin R.
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2007, 2007, 6570
  • [8] GENERALIZED NETWORK TOPOLOGY PROGRAM FOR REAL-TIME SECURITY ASSESSMENT
    MANSOUR, O
    [J]. IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1978, 97 (04): : 1012 - 1012
  • [9] Security Analysis of Topology Structure of Electric Power Communication Network
    Jiang Dairu
    Tian Dan
    Liu Xintong
    Shen Zhentao
    [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 76 - 79
  • [10] Analysis of Security and Threat of Underwater Wireless Sensor Network Topology
    Yang, Guang
    Wei, Zhiqiang
    Cong, Yanping
    Jia, Dongning
    [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334