A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
A structural framework for modeling multi-stage network attacks
Proceedings. International Conference on Parallel Processing Workshop
This paper provides a methodology for capturing the structure of various network vulnerabilities and multi-stage attacks. ...
By extending the attack tree paradigm, we provide a context sensitive attack modeling framework that, through abstraction, supports incident correlation, analysis, and prediction. ...
Conclusions The modeling framework described here provides a foundation for classifying multi-stage network attacks in a composable, functional structure. ...
doi:10.1109/icppw.2002.1039705
dblp:conf/icppw/DaleyLD02
fatcat:7igrw7yjjzaxhjcanmkj5caydq
Multi-Stage Threat Modelling and Security Monitoring in 5GCN
[article]
2021
arXiv
pre-print
When considering multi-stage threat scenarios a coordinated, centralised approach to security monitoring is required for the early detection of attacks which may affect different parts of the network. ...
The fifth generation of mobile networks (5G) promises a range of new capabilities including higher data rates and more connected users. ...
Modelling 5GCN Threats as Graphs As a tool for modelling multi-stage attacks, attack graphs can be utilised to map the relationship between attack steps to network infrastructure. ...
arXiv:2108.11207v1
fatcat:qg342ooatrhu7d4cegly3ocmbe
Control Challenges for Resilient Control Systems
[article]
2021
arXiv
pre-print
We introduce frameworks that can provide a holistic view of the control system resiliency and a quantitative design paradigm that can enable an optimal cross-layer and cross-stage design at the planning ...
, operation, and recovery stage of control systems. ...
The games-in-games framework provides a design paradigm for the multi-stage and multi-layer design of resilient control systems. ...
arXiv:2001.00712v2
fatcat:tkvaoe7ehnab5gv3z73i7e27fq
Fog-based Attack Detection Framework for Internet of Things Using Deep Learning
2020
IEEE Access
This paper presents a comprehensive attack detection framework of a distributed, robust, and high detection rate to detect several IoT cyber-attacks using DL. ...
INDEX TERMS Attack detection, cybersecurity, deep learning, fog computing, long short term memory, Internet of Things. include network and information security, network measurement and modeling, and parallel ...
FIGURE 1 . 1 Fog computing architecture for IoT systems.
FIGURE 2 . 2 Proposed framework stages for attack detection in IoT networks. ...
doi:10.1109/access.2020.2988854
fatcat:6t34wvczbzaqbgvguinp47u5mi
Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
BcN 인프라 보호를 위한 다중 도메인 보안 관리 프레임워크와 성능평가
2005
The KIPS Transactions PartC
BcN 인프라 보호를 위한 다중 도메인 보안 관리 프레임워크와 성능평가
In this paper, we present a multi-domain security management framework which may be used for a global intrusion detection at multiple domains of BcN and describe its characteristics. ...
In a high-speed network environment such as BcN, it is more likely for the network resources to be exposed to various intrusion activities. ...
We executed modeling for the proposed communication model, designed and implemented a simulator. ...
doi:10.3745/kipstc.2005.12c.6.817
fatcat:2gmi4jnwtrd3bao5r7whnaodgm
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection
2020
IEEE Transactions on Network and Service Management
This paper proposes a novel multi-stage optimized ML-based NIDS framework that reduces computational complexity while maintaining its detection performance. ...
Moreover, the model performance is enhanced with hyper-parameter optimization with detection accuracies over 99% for both datasets, outperforming recent literature works by 1-2% higher accuracy and 1-2% ...
Fig. 1 : 1 Proposed Multi-stage Optimized ML-based NIDS Framework V. PROPOSED MULTI-STAGE OPTIMIZED ML-BASED NIDS FRAMEWORK A. ...
doi:10.1109/tnsm.2020.3014929
fatcat:r3g4dfkgdvbmpkrfik2s3hmbby
Dynamic Games for Secure and Resilient Control System Design
[article]
2019
arXiv
pre-print
In this review, we first provide a multi-layer perspective toward increasingly complex and integrated control systems and then introduce several variants of dynamic games for modeling different layers ...
To this end, game theory provides a bottom-up modeling paradigm to capture the strategic interactions among multiple components of the complex system and enables a holistic view to understand and design ...
The design of security mechanisms against APT attacks can be viewed as a multi-stage game where an attacker aims to find a path toward the control system network from its initial entry point while the ...
arXiv:1910.07510v3
fatcat:4rxeyse6dnbspop7hxalhzcedq
An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment
[article]
2021
arXiv
pre-print
In this work, we provide an overview of the SG COSE, present a multi-stage attack model with the potential to disrupt grid operations, and show exemplary performance evaluations of the IDS in specific ...
The COSE consists of an energy grid simulator, simulators for Operation Technology (OT) devices, and a network emulator for realistic IT process networks. ...
Acknowledgment: This work has partly been funded by the German Federal Ministry for Economic Affairs and Energy (BMWi) under project funding reference 0350028. ...
arXiv:2110.02040v1
fatcat:yiym7g6y4bchxorovjr6pgacdq
Cyber Security Situational Awareness
2016
2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
Then, we have put forward a multi-level analysis framework for CSSA. ...
In a time cyber-attacks getting increasingly sophisticated and making potentially disruptive impacts, it becomes apparent that a holistic approach is fundamentally needed to handling security data effectively ...
Another point, in the multi-level analysis framework, data acquisition and storage follows a distributed structure, that is, every kind of data should have a processing corresponding to the data that is ...
doi:10.1109/ithings-greencom-cpscom-smartdata.2016.165
dblp:conf/ithings/Tianfield16
fatcat:bsjzygtzbreepin2mtda7sccne
A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES
2014
Journal of Computer Science
Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks ...
This can guide the researchers to a better understanding of P2P botnets and easier for them developing more sufficient detection techniques. ...
This research is supported by National Advanced IPv6 Centre of Excellence (NAV6), Universiti Sains Malaysia (USM).Grant title: "A comprehensive botnet mitigation Ecosystem".Acc.No:1001/PNAV/857001. ...
doi:10.3844/jcssp.2014.169.177
fatcat:4quoft4bnrdttosfalen46igmy
Data Fusion based Two-stage Cascade Framework for Multi-Modality Face Anti-Spoofing
2021
IEEE Transactions on Cognitive and Developmental Systems
To address this issue, we propose a multi-modility data based two-stage cascade framework for face anti-spoofing. The proposed framework has two advantages. ...
Existing face anti-spoofing models using deep learning for multi-modality data suffer from low generalization in the case of using variety of presentation attacks such as 2D printing and high-precision ...
For this task, we have developed a two-stage cascade framework to extract both face reflectance features and multi-level of face texture features by considering data non-linearity fusion strategy and network ...
doi:10.1109/tcds.2021.3064679
fatcat:wqiw6x54hjgufn47pwg4g2nrri
An Overview of Advanced Persistent Threat Detection Based on Machine Learning
2020
DEStech Transactions on Engineering and Technology Research
This article mainly discusses several innovative methods for detecting APT attacks based on machine learning, and looks forward to the future development direction. ...
In particular, Advanced Persistent Threat (APT) attacks are intensifying. How to effectively prevent this attack method has become the focus. ...
In this approach, APT is considered a multi-media multi-stage attack with a continuous strategic campaign. ...
doi:10.12783/dtetr/mcaee2020/35023
fatcat:cwp2247ykna25l5ip7c2fcgrcq
A Transfer Learning with Deep Neural Network Approach for Network Intrusion Detection
2021
International Journal of Intelligent Computing Research
This paper also displays both binary classification (normal vs. attack) and multi-class classification (classifying types of attacks) for network intrusion detection. ...
This paper presents a novel network intrusion classification framework using transfer learning from the VGG-16 pre-trained model. ...
At the initial stage, the framework prepares the given network intrusion data. ...
doi:10.20533/ijicr.2042.4655.2021.0132
fatcat:aj72b3gwlbfrfc7khhpwr3mz7m
Model-based Approach to Multi-domain Monitoring Data Aggregation
2021
Journal of ICT Standardization
This paper presents a model-based approach to a data aggregator framework, relying on standardized data models and telemetry protocols, and integrated with an open-source network orchestration stack to ...
Modern network infrastructures provide a vast amount of disparate data sources, especially in the multi-domain scenarios considered by the ETSI Industry Specification Group (ISG) Zero Touch Network and ...
The Commission is not responsible for any use that may be made of the information it contains. ...
doi:10.13052/jicts2245-800x.9210
fatcat:iatqri4gkbccdlnnmd2jzb67nu
A Quantitative Framework for Network Resilience Evaluation using Dynamic Bayesian Network
[article]
2021
arXiv
pre-print
The proposed framework can be used to evaluate the network's multi-stage resilience processes when suffering various attacks and recoveries. ...
This paper establishes a novel quantitative framework for evaluating network resilience using the Dynamic Bayesian Network. ...
multi-stage processes of network resilience. ...
arXiv:2108.09040v1
fatcat:xaozxhsmcjflrknu6lbqs7ffmq
« Previous
Showing results 1 — 15 out of 71,259 results