Filters








71,259 Hits in 5.1 sec

A structural framework for modeling multi-stage network attacks

K. Daley, R. Larson, J. Dawkins
Proceedings. International Conference on Parallel Processing Workshop  
This paper provides a methodology for capturing the structure of various network vulnerabilities and multi-stage attacks.  ...  By extending the attack tree paradigm, we provide a context sensitive attack modeling framework that, through abstraction, supports incident correlation, analysis, and prediction.  ...  Conclusions The modeling framework described here provides a foundation for classifying multi-stage network attacks in a composable, functional structure.  ... 
doi:10.1109/icppw.2002.1039705 dblp:conf/icppw/DaleyLD02 fatcat:7igrw7yjjzaxhjcanmkj5caydq

Multi-Stage Threat Modelling and Security Monitoring in 5GCN [article]

Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis
2021 arXiv   pre-print
When considering multi-stage threat scenarios a coordinated, centralised approach to security monitoring is required for the early detection of attacks which may affect different parts of the network.  ...  The fifth generation of mobile networks (5G) promises a range of new capabilities including higher data rates and more connected users.  ...  Modelling 5GCN Threats as Graphs As a tool for modelling multi-stage attacks, attack graphs can be utilised to map the relationship between attack steps to network infrastructure.  ... 
arXiv:2108.11207v1 fatcat:qg342ooatrhu7d4cegly3ocmbe

Control Challenges for Resilient Control Systems [article]

Quanyan Zhu
2021 arXiv   pre-print
We introduce frameworks that can provide a holistic view of the control system resiliency and a quantitative design paradigm that can enable an optimal cross-layer and cross-stage design at the planning  ...  , operation, and recovery stage of control systems.  ...  The games-in-games framework provides a design paradigm for the multi-stage and multi-layer design of resilient control systems.  ... 
arXiv:2001.00712v2 fatcat:tkvaoe7ehnab5gv3z73i7e27fq

Fog-based Attack Detection Framework for Internet of Things Using Deep Learning

Ahmed Samy, Haining Yu, Hongli Zhang
2020 IEEE Access  
This paper presents a comprehensive attack detection framework of a distributed, robust, and high detection rate to detect several IoT cyber-attacks using DL.  ...  INDEX TERMS Attack detection, cybersecurity, deep learning, fog computing, long short term memory, Internet of Things. include network and information security, network measurement and modeling, and parallel  ...  FIGURE 1 . 1 Fog computing architecture for IoT systems. FIGURE 2 . 2 Proposed framework stages for attack detection in IoT networks.  ... 
doi:10.1109/access.2020.2988854 fatcat:6t34wvczbzaqbgvguinp47u5mi

Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
BcN 인프라 보호를 위한 다중 도메인 보안 관리 프레임워크와 성능평가

Jung-Sook Jang, Yong-Hee Jeon, Jong-Soo Jang
2005 The KIPS Transactions PartC  
In this paper, we present a multi-domain security management framework which may be used for a global intrusion detection at multiple domains of BcN and describe its characteristics.  ...  In a high-speed network environment such as BcN, it is more likely for the network resources to be exposed to various intrusion activities.  ...  We executed modeling for the proposed communication model, designed and implemented a simulator.  ... 
doi:10.3745/kipstc.2005.12c.6.817 fatcat:2gmi4jnwtrd3bao5r7whnaodgm

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Mohammad Noor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami
2020 IEEE Transactions on Network and Service Management  
This paper proposes a novel multi-stage optimized ML-based NIDS framework that reduces computational complexity while maintaining its detection performance.  ...  Moreover, the model performance is enhanced with hyper-parameter optimization with detection accuracies over 99% for both datasets, outperforming recent literature works by 1-2% higher accuracy and 1-2%  ...  Fig. 1 : 1 Proposed Multi-stage Optimized ML-based NIDS Framework V. PROPOSED MULTI-STAGE OPTIMIZED ML-BASED NIDS FRAMEWORK A.  ... 
doi:10.1109/tnsm.2020.3014929 fatcat:r3g4dfkgdvbmpkrfik2s3hmbby

Dynamic Games for Secure and Resilient Control System Design [article]

Yunhan Huang, Juntao Chen, Linan Huang, Quanyan Zhu
2019 arXiv   pre-print
In this review, we first provide a multi-layer perspective toward increasingly complex and integrated control systems and then introduce several variants of dynamic games for modeling different layers  ...  To this end, game theory provides a bottom-up modeling paradigm to capture the strategic interactions among multiple components of the complex system and enables a holistic view to understand and design  ...  The design of security mechanisms against APT attacks can be viewed as a multi-stage game where an attacker aims to find a path toward the control system network from its initial entry point while the  ... 
arXiv:1910.07510v3 fatcat:4rxeyse6dnbspop7hxalhzcedq

An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment [article]

Ömer Sen and Dennis van der Velde and Sebastian N. Peters and Martin Henze
2021 arXiv   pre-print
In this work, we provide an overview of the SG COSE, present a multi-stage attack model with the potential to disrupt grid operations, and show exemplary performance evaluations of the IDS in specific  ...  The COSE consists of an energy grid simulator, simulators for Operation Technology (OT) devices, and a network emulator for realistic IT process networks.  ...  Acknowledgment: This work has partly been funded by the German Federal Ministry for Economic Affairs and Energy (BMWi) under project funding reference 0350028.  ... 
arXiv:2110.02040v1 fatcat:yiym7g6y4bchxorovjr6pgacdq

Cyber Security Situational Awareness

Huaglory Tianfield
2016 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)  
Then, we have put forward a multi-level analysis framework for CSSA.  ...  In a time cyber-attacks getting increasingly sophisticated and making potentially disruptive impacts, it becomes apparent that a holistic approach is fundamentally needed to handling security data effectively  ...  Another point, in the multi-level analysis framework, data acquisition and storage follows a distributed structure, that is, every kind of data should have a processing corresponding to the data that is  ... 
doi:10.1109/ithings-greencom-cpscom-smartdata.2016.165 dblp:conf/ithings/Tianfield16 fatcat:bsjzygtzbreepin2mtda7sccne

A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES

Mohammed Jamil Elhalabi, Selvakumar Manickam, Loai Bani Melhim, Mohammed Anbar, Huda Alhalabi
2014 Journal of Computer Science  
Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks  ...  This can guide the researchers to a better understanding of P2P botnets and easier for them developing more sufficient detection techniques.  ...  This research is supported by National Advanced IPv6 Centre of Excellence (NAV6), Universiti Sains Malaysia (USM).Grant title: "A comprehensive botnet mitigation Ecosystem".Acc.No:1001/PNAV/857001.  ... 
doi:10.3844/jcssp.2014.169.177 fatcat:4quoft4bnrdttosfalen46igmy

Data Fusion based Two-stage Cascade Framework for Multi-Modality Face Anti-Spoofing

Weihua Liu, Xiaokang Wei, Tao Lei, Xingwu Wang, Hongying Meng, Asoke K. Nandi
2021 IEEE Transactions on Cognitive and Developmental Systems  
To address this issue, we propose a multi-modility data based two-stage cascade framework for face anti-spoofing. The proposed framework has two advantages.  ...  Existing face anti-spoofing models using deep learning for multi-modality data suffer from low generalization in the case of using variety of presentation attacks such as 2D printing and high-precision  ...  For this task, we have developed a two-stage cascade framework to extract both face reflectance features and multi-level of face texture features by considering data non-linearity fusion strategy and network  ... 
doi:10.1109/tcds.2021.3064679 fatcat:wqiw6x54hjgufn47pwg4g2nrri

An Overview of Advanced Persistent Threat Detection Based on Machine Learning

Kai Xing, Aiping Li, Rong Jiang
2020 DEStech Transactions on Engineering and Technology Research  
This article mainly discusses several innovative methods for detecting APT attacks based on machine learning, and looks forward to the future development direction.  ...  In particular, Advanced Persistent Threat (APT) attacks are intensifying. How to effectively prevent this attack method has become the focus.  ...  In this approach, APT is considered a multi-media multi-stage attack with a continuous strategic campaign.  ... 
doi:10.12783/dtetr/mcaee2020/35023 fatcat:cwp2247ykna25l5ip7c2fcgrcq

A Transfer Learning with Deep Neural Network Approach for Network Intrusion Detection

Mohammad Masum, Hossain Shahriar, Hisham M. Haddad
2021 International Journal of Intelligent Computing Research  
This paper also displays both binary classification (normal vs. attack) and multi-class classification (classifying types of attacks) for network intrusion detection.  ...  This paper presents a novel network intrusion classification framework using transfer learning from the VGG-16 pre-trained model.  ...  At the initial stage, the framework prepares the given network intrusion data.  ... 
doi:10.20533/ijicr.2042.4655.2021.0132 fatcat:aj72b3gwlbfrfc7khhpwr3mz7m

Model-based Approach to Multi-domain Monitoring Data Aggregation

Antonio Pastor, Diego R. López, Jose Ordonez-Lucena, Sonia Fernández, Jesús Folgueira
2021 Journal of ICT Standardization  
This paper presents a model-based approach to a data aggregator framework, relying on standardized data models and telemetry protocols, and integrated with an open-source network orchestration stack to  ...  Modern network infrastructures provide a vast amount of disparate data sources, especially in the multi-domain scenarios considered by the ETSI Industry Specification Group (ISG) Zero Touch Network and  ...  The Commission is not responsible for any use that may be made of the information it contains.  ... 
doi:10.13052/jicts2245-800x.9210 fatcat:iatqri4gkbccdlnnmd2jzb67nu

A Quantitative Framework for Network Resilience Evaluation using Dynamic Bayesian Network [article]

Shanqing Jiang, Lin Yang, Guang Cheng, Xianming Gao, Tao Feng, Yuyang Zhou
2021 arXiv   pre-print
The proposed framework can be used to evaluate the network's multi-stage resilience processes when suffering various attacks and recoveries.  ...  This paper establishes a novel quantitative framework for evaluating network resilience using the Dynamic Bayesian Network.  ...  multi-stage processes of network resilience.  ... 
arXiv:2108.09040v1 fatcat:xaozxhsmcjflrknu6lbqs7ffmq
« Previous Showing results 1 — 15 out of 71,259 results