Detecting malicious groups of agents

被引:0
|
作者
Braynov, S [1 ]
Jadliwala, M [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Springfield, IL 62703 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we study coordinated attacks launched by multiple malicious agents and the problem of detecting malicious groups of attackers. The paper proposes a formal method and an algorithm for detecting action interference between users. It has to be pointed out that some members of a malicious group may not necessarily perform illegal actions, for example, they can prepare and organize an attack without taking active part in the actual attack execution. In addition, members of a malicious group May not necessarily know each other The method we propose tries to solve these problems by building a Coordination graph which includes all users who, in some way or another, cooperate with each other i.e., the maximal malicious group of cooperating users including not only the executers of the attack but also their assistants. The paper also proposes formal metrics on coordination graphs that help differentiate central from peripheral attackers.
引用
收藏
页码:90 / 99
页数:10
相关论文
共 50 条
  • [31] Detecting Malicious Authentication Events Trustfully
    Kaiafas, Georgios
    Varisteas, Georgios
    Lagraa, Sofiane
    State, Radu
    Nguyen, Cu D.
    Ries, Thorsten
    Ourdane, Mohamed
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [32] Detecting the Malicious Application using FRAppE
    Sultana, Yasmeen
    Khodanpur, B. I.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1027 - 1032
  • [33] Detecting malicious manipulation in grid enviromments
    Martins, Felipe
    Maia, Marcio
    de Castro Andrade, Rossana M.
    dos Santos, Aldri L.
    Neuman de Souza, Jose
    [J]. SBAC-OAD 2006: 18TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING, 2006, : 28 - +
  • [34] Detecting Malicious Campaigns in Crowdsourcing Platforms
    Choi, Hongkyu
    Lee, Kyumin
    Webb, Steve
    [J]. PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, 2016, : 197 - 202
  • [35] Detecting Malicious Manipulation of Synchrophasor Data
    Pal, Seemita
    Sikdar, Biplab
    Chow, Joe H.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2015, : 145 - 150
  • [36] Significant Factors for Detecting Malicious Redirections
    Hans, Kanchan
    Ahuja, Laxmi
    Muttoo, S. K.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 499 - 502
  • [37] Method for Detecting Unknown Malicious Executables
    Rozenberg, Boris
    Gudes, Ehud
    Elovici, Yuval
    Fledel, Yuval
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 376 - 377
  • [38] Detecting malicious short URLs on Twitter
    Nepali, Raj Kumar
    Wang, Yong
    Alshboul, Yazan
    [J]. AMCIS 2015 PROCEEDINGS, 2015,
  • [39] On Automatically Detecting Malicious Impostor Emails
    Kartaltepe, Erhan J.
    Xu, Shouhuai
    [J]. APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 33 - 47
  • [40] Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities
    Shibahara, Toshiki
    Takata, Yuta
    Akiyama, Mitsuaki
    Yagi, Takeshi
    Yada, Takeshi
    [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 655 - 664