A highly scalable model for network attack identification and path prediction

被引:3
|
作者
Nanda, Sanjeeb [1 ]
Deo, Narsingh [1 ]
机构
[1] Univ Cent Florida, Sch Comp Sci, Orlando, FL 32816 USA
关键词
D O I
10.1109/SECON.2007.342984
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rapid growth of the Internet has triggered an explosion in the number of networked applications that leverage its capabilities. Unfortunately, many of them are intentionally designed to burden or destroy the capabilities of their peers and the supporting network infrastructure. Hence, considerable effort has been focused on detecting and predicting the breaches in security propagated by these malicious applications. However, the enormity of the Internet poses a formidable challenge to representing and analyzing such attacks on it using scalable models. Furthermore, the unavailability of complete information on network vulnerabilities makes the task of forecasting the systems that are likely to be exploited by such applications in the future even harder. This paper presents a technique to identify attacks on large networks using a highly scalable model, while filtering for false positives and negatives. It also forecasts the propagation of the security failures proliferated by attacks over time and their likely targets in the future.
引用
收藏
页码:663 / 668
页数:6
相关论文
共 50 条
  • [1] Prediction of network attack profit path based on NAPG model
    Kun L.
    Hui W.
    Zihao S.
    Journal of China Universities of Posts and Telecommunications, 2020, 27 (05): : 91 - 102
  • [2] Prediction of network attack profit path based on NAPG model
    Liu Kun
    Wang Hui
    Shen Zihao
    The Journal of China Universities of Posts and Telecommunications, 2020, 27 (05) : 91 - 102
  • [3] A network attack path prediction method using attack graph
    Liu, Xuguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [4] On scalable attack detection in the network
    Kompella, Ramana Rao
    Singh, Sumeet
    Varghese, George
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (01) : 14 - 25
  • [5] Scalable Attack Path Finding for Increased Security
    Gonda, Tom
    Puzis, Rami
    Shapira, Bracha
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 234 - 249
  • [6] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
  • [7] Scalable network path emulation
    Agarwal, S
    Sommers, J
    Barford, P
    MASCOTS 2005:13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2005, : 219 - 228
  • [8] A Scalable Approach for a Distributed Network of Attack Sensors
    Gassen, Jan
    Gerhards-Padilla, Elmar
    ERCIM NEWS, 2012, (90): : 20 - 21
  • [9] A scheme of reconstructing network attack path
    Yu, Ling
    Chen, Bo
    Xiao, Jun-Mo
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2006, 35 (03): : 392 - 395
  • [10] A NEURAL NETWORK MODEL FOR PREDICTION ERROR IDENTIFICATION
    HAKIM, NZ
    KAUFMAN, JJ
    SIFFERT, RS
    MEADOWS, HE
    TWENTY-THIRD ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2: CONFERENCE RECORD, 1989, : 119 - 122