A highly scalable model for network attack identification and path prediction

被引:3
|
作者
Nanda, Sanjeeb [1 ]
Deo, Narsingh [1 ]
机构
[1] Univ Cent Florida, Sch Comp Sci, Orlando, FL 32816 USA
关键词
D O I
10.1109/SECON.2007.342984
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rapid growth of the Internet has triggered an explosion in the number of networked applications that leverage its capabilities. Unfortunately, many of them are intentionally designed to burden or destroy the capabilities of their peers and the supporting network infrastructure. Hence, considerable effort has been focused on detecting and predicting the breaches in security propagated by these malicious applications. However, the enormity of the Internet poses a formidable challenge to representing and analyzing such attacks on it using scalable models. Furthermore, the unavailability of complete information on network vulnerabilities makes the task of forecasting the systems that are likely to be exploited by such applications in the future even harder. This paper presents a technique to identify attacks on large networks using a highly scalable model, while filtering for false positives and negatives. It also forecasts the propagation of the security failures proliferated by attacks over time and their likely targets in the future.
引用
收藏
页码:663 / 668
页数:6
相关论文
共 50 条
  • [31] A highly scalable interconnection network for parallel image processing
    Wang, HY
    Gu, WK
    NEURAL NETWORK AND DISTRIBUTED PROCESSING, 2001, 4555 : 11 - 15
  • [32] Poster: Towards Highly Scalable Multicast via Explicit Path Definition
    Meng, Rui
    Wan, Junjie
    Xu, Bing
    Wang, Wanhong
    Li, Zhongwei
    Wang, Chuang
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, CONEXT 2021, 2021, : 487 - 488
  • [33] Identification method of attack path based on immune intrusion detection
    Wenhua, Huang
    Geng, Yishuang
    Journal of Networks, 2014, 9 (04) : 964 - 971
  • [34] Two Scalable Analyses of Compact Attack Graphs for Defending Network Security
    Chen, Feng
    Tu, Ri
    Zhang, Yi
    Su, Jinshu
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 627 - 632
  • [35] A network embedding model for pathogenic genes prediction by multi-path random walking on heterogeneous network
    Xu, Bo
    Liu, Yu
    Yu, Shuo
    Wang, Lei
    Dong, Jie
    Lin, Hongfei
    Yang, Zhihao
    Wang, Jian
    Xia, Feng
    BMC MEDICAL GENOMICS, 2019, 12 (Suppl 10)
  • [36] A network embedding model for pathogenic genes prediction by multi-path random walking on heterogeneous network
    Bo Xu
    Yu Liu
    Shuo Yu
    Lei Wang
    Jie Dong
    Hongfei Lin
    Zhihao Yang
    Jian Wang
    Feng Xia
    BMC Medical Genomics, 12
  • [37] A highly scalable high voltage MOSFET model
    Chauhan, Y. S.
    Anghel, C.
    Krummenacher, F.
    Ionescu, A. M.
    Declercq, M.
    Gillon, R.
    Frere, S.
    Desoete, B.
    ESSDERC 2006: PROCEEDINGS OF THE 36TH EUROPEAN SOLID-STATE DEVICE RESEARCH CONFERENCE, 2006, : 270 - +
  • [38] A Model for Scalable and Autonomic Network Management
    Eyal, Amir
    Braun, Robin
    ACTIVE AND PROGRAMMABLE NETWORKS, 2009, 4388 : 194 - 199
  • [39] Scalable Attack Representation Model using Logic Reduction Techniques
    Hong, Jin B.
    Kim, Dong Seong
    Takaoka, Tadao
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 404 - 411
  • [40] An Improved Dynamic Process Neural Network Prediction Model Identification Method
    Lyu, Shuran
    Liu, Peng
    Liu, Lu
    Ma, Shuqi
    Wang, Tao
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80