A highly scalable model for network attack identification and path prediction

被引:3
|
作者
Nanda, Sanjeeb [1 ]
Deo, Narsingh [1 ]
机构
[1] Univ Cent Florida, Sch Comp Sci, Orlando, FL 32816 USA
关键词
D O I
10.1109/SECON.2007.342984
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rapid growth of the Internet has triggered an explosion in the number of networked applications that leverage its capabilities. Unfortunately, many of them are intentionally designed to burden or destroy the capabilities of their peers and the supporting network infrastructure. Hence, considerable effort has been focused on detecting and predicting the breaches in security propagated by these malicious applications. However, the enormity of the Internet poses a formidable challenge to representing and analyzing such attacks on it using scalable models. Furthermore, the unavailability of complete information on network vulnerabilities makes the task of forecasting the systems that are likely to be exploited by such applications in the future even harder. This paper presents a technique to identify attacks on large networks using a highly scalable model, while filtering for false positives and negatives. It also forecasts the propagation of the security failures proliferated by attacks over time and their likely targets in the future.
引用
收藏
页码:663 / 668
页数:6
相关论文
共 50 条
  • [1] Prediction of network attack profit path based on NAPG model
    Liu Kun
    Wang Hui
    Shen Zihao
    [J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27 (05) : 91 - 102
  • [2] Prediction of network attack profit path based on NAPG model
    Kun, Liu
    Hui, Wang
    Zihao, Shen
    [J]. Journal of China Universities of Posts and Telecommunications, 2020, 27 (05): : 91 - 102
  • [3] A network attack path prediction method using attack graph
    Liu, Xuguang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [4] On scalable attack detection in the network
    Kompella, Ramana Rao
    Singh, Sumeet
    Varghese, George
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (01) : 14 - 25
  • [5] Scalable Attack Path Finding for Increased Security
    Gonda, Tom
    Puzis, Rami
    Shapira, Bracha
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 234 - 249
  • [6] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
  • [7] Scalable network path emulation
    Agarwal, S
    Sommers, J
    Barford, P
    [J]. MASCOTS 2005:13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2005, : 219 - 228
  • [8] A Scalable Approach for a Distributed Network of Attack Sensors
    Gassen, Jan
    Gerhards-Padilla, Elmar
    [J]. ERCIM NEWS, 2012, (90): : 20 - 21
  • [9] A NEURAL NETWORK MODEL FOR PREDICTION ERROR IDENTIFICATION
    HAKIM, NZ
    KAUFMAN, JJ
    SIFFERT, RS
    MEADOWS, HE
    [J]. TWENTY-THIRD ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2: CONFERENCE RECORD, 1989, : 119 - 122
  • [10] A MODEL CHECKER BASED APPROACH OF ATTACK PATH ENUMERATION FOR NETWORK SECURITY MANAGEMENT
    Bagchi, Atig
    Ghosh, S. K.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1809 - 1816