Filters








129,646 Hits in 7.3 sec

An Attack Threat Effect Analysis Method Based on K-Means Evaluation

Jindong He, Bo Liu, Qian Guo, G. Lee
2018 MATEC Web of Conferences  
To take full advantage of the specified features of the attack dataset in network attack effect evaluation, maximize the efficiency of evaluation without losing its accuracy.  ...  Then establish a relation between the attack dataset and the effect category via an improved K-Means algorithm, thus achieving an explicit division of attack effect set and provide efficient evaluation  ...  This paper combines the characteristics of network entropy and the clustering algorithm, this paper proposes an attack effect evaluation based on k-means clustering algorithm, this algorithm using target  ... 
doi:10.1051/matecconf/201822801016 fatcat:yswjovsmvrbabnqz24tn522bwq

Smart defence: an architecture for new challenges to cyber security

Mario Golling, Robert Koch, Peter Hillmann, Gabi Dreo Rodosek
2014 DFN Tagungen  
In order to improve the protection, an analysis of these Smart Attacks in terms of underlying characteristics has to be performed to form abasis against those emerging threads.  ...  Recentexamples likethe hack of the SonyPlaystation Network or the compromise of RSA are just some examples of high-quality attack vectors.  ...  Acknowledgements This work waspartly funded by Flamingo, aNetwork of Excellence project (ICT-318488) supported by the European Commission under its Seventh Framework Programme.  ... 
dblp:conf/dfn/Golling0HR14 fatcat:7evvsmgry5aenibawsfp5rexfi

Attack Resiliency of Network Topologies [chapter]

Heejo Lee, Jong Kim
2004 Lecture Notes in Computer Science  
Network topology has no direct effect on the correctness of network protocols, however, it influences on the performance of networks and the survivability of the networks under attacks.  ...  In this paper, we examines the attack resiliency of network topologies and shows that the topological structure has direct impact on the robustness of a network under attacks.  ...  Thus, evaluation of attack cost and effectiveness is the future work of this study. As well, this work will continue to find evolving strategies for making networks more resilient to attacks.  ... 
doi:10.1007/978-3-540-30501-9_123 fatcat:n2ca3pphofduhpix25l5jin62i

CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry [article]

Marcel Rumez, Jürgen Dürrwang, Tim Brecht, Timo Steinshorn, Peter Neugebauer, Reiner Kriesten, Eric Sax
2019 arXiv   pre-print
We evaluated our approach on a real vehicle network.  ...  However, it is challenging to detect attackers who secretly connect to CAN networks and do not actively participate in bus traffic.  ...  ACKNOWLEDGEMENTS This work has been developed in the project AUTO-SIMA (reference number: 13FH006IX6) which is partly funded by the German ministry of education and research (BMBF) within the research  ... 
arXiv:1910.02847v1 fatcat:jfdfmnykorhdpexvf6yreq5rwy

Examining traffic microstructures to improve model development

Henry Clausen, David Aspinall
2021 2021 IEEE Security and Privacy Workshops (SPW)  
These models fail for input traffic with particular characteristics such as retransmissions or overly dispersed flow interarrival times.  ...  We believe this shows promise for using tailored data with controllable and labelled characteristics to effectively improve model development in NID, a practice that helped model development significantly  ...  ACKNOWLEDGEMENT The authors gratefully acknowledge funding support from BT Group PLC, UKRI/EPSRC (grant EP/N510129/1) and the hosting University of Edinburgh.  ... 
doi:10.1109/spw53761.2021.00011 fatcat:xti4q25gjfhg3nzqqlternvrbq

Robustness Analysis of Urban Rail Transit Network

Xu Hui, Li Yang
2019 International Journal of Performability Engineering  
In addition, the nodes that link to different sections of the network, connect a cluster of nodes to the main network, or connect to more than one rail transit line are identified as important nodes of  ...  After calculating the topological parameters and robustness analysis parameters, the attack strategies for URTN are established.  ...  Specifically, it is an ability of a rail transit network to withstand unexpected risk events with an acceptation reduction of operation performance and maintain the partial characteristics in face of disruptions  ... 
doi:10.23940/ijpe.19.10.p23.27622771 fatcat:rfryaq6fozbufjz5wpgfyyesnq

First insights from a mobile honeypot

Matthias Wählisch, Sebastian Trapp, Christian Keil, Jochen Schönfelder, Thomas C. schmidt, Jochen Schiller
2012 Computer communication review  
We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devices.  ...  Based on a mobile honeypot that extracts first statistical results, our findings indicate that a few topological domains of the Internet have started to place particular focus on attacking mobile networks  ...  Our preliminary results for an UMTS-connected device show that on the overall offenders show an intensity similar to home networks, whereas regions and originators of attacks are better pronounced and  ... 
doi:10.1145/2377677.2377743 fatcat:hp53iljmxvgnxgypr7zchtchma

Social Network Theoretic Framework for Organizational Social Engineering Susceptibility Index

Manish Gupta, Raj Sharman
2006 Americas Conference on Information Systems  
In this paper, we propose a framework for development of social engineering susceptibility index (SESI) that reveals real risks from social engineering attack that an organization' s employees are exposed  ...  Social Engineering is an undeniable and pervasive threat to the security of information systems of an organization due to its reliance on social nature of human beings.  ...  For example, an attacker in one location of an organization would have less information about the environment and characteristics of other location making attack ineffective.  ... 
dblp:conf/amcis/GuptaS06 fatcat:zq7s3ffuhbeetnfszlscs4t24i

Attack Graph Generation with Machine Learning for Network Security

Kijong Koo, Daesung Moon, Jun-Ho Huh, Se-Hoon Jung, Hansung Lee
2022 Electronics  
Recently, with the discovery of various security threats, diversification of hacking attacks, and changes in the network environment such as the Internet of Things, security threats on the network are  ...  In this paper, we propose a cheap and simple method for generating the attack graph. The proposed approach consists of learning and generating stages.  ...  The common approach is to apply separate weights for performance evaluation.  ... 
doi:10.3390/electronics11091332 fatcat:w3qzod3qlrfjrkugm63jvrbpcu

Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks [article]

Akash Raj Narayanadoss, Tram Truong-Huu, Purnima Murali Mohan, Mohan Gurusamy
2019 arXiv   pre-print
ITS networks are comprised of the Internet-connected vehicles (mobile nodes), roadside units (RSU), cellular base stations and conventional core network routers to create a complete data transmission platform  ...  With the support of software-defined networking that enables dynamic network monitoring and traffic characteristic extraction, we develop a machine learning model that can learn the temporal correlation  ...  It also guarantees a finite convergence for linearly-separable data.  ... 
arXiv:1812.03639v2 fatcat:eb3qxhs425holk5rsra4agn3fq

Using Discrete Event Simulation to Model Attacker Interactions with Cyber and Physical Security Systems

Casey Perkins, George Muller
2015 Procedia Computer Science  
limit an attacker's likelihood of success.  ...  behaviours to evaluate a range of scenarios.  ...  These include simulation, an application of network theory, and Bayesian networks.  ... 
doi:10.1016/j.procs.2015.09.199 fatcat:5q4wgmi5ejb2tjn7marzxn2auy

Vulnerability of Submarine Cable Network of Mainland China: Comparison of Vulnerability between before and after Construction of Trans-Arctic Cable System

Yongshun Xie, Chengjin Wang, Qiuye Sun
2021 Complexity  
The submarine optical-fiber cable (submarine cable) is a large connectivity infrastructure, which plays an important role in international communication, cyber-physical systems, and even national security  ...  This paper proposes a quantitative method to measure the vulnerability of the submarine cable network and evaluates the influence of the upcoming trans-Arctic cable (TAC) system on the submarine cable  ...  Acknowledgments is study was supported by the National Natural Science Foundation of China (no. 42071151) and the Strategic Priority Research Program of the Chinese Academy of Sciences (no.  ... 
doi:10.1155/2021/6662232 fatcat:4kfaeeujerde3lbyzroa2jf5km

The Method of Detecting Online Password Attacks Based on High-level Protocol Analysis and Clustering Techniques

Nguyen Hong Son, Ha Thanh Dung
2019 International Journal of Computer Networks & Communications  
The certainty of the solution comes from using the results of an in-depth analysis of attack characteristics to build the detection capacity of the mechanism.  ...  In this context, consolidating password-based authentication mechanisms is critical, but monitoring measures for timely detection of attacks also play an important role in this battle.  ...  As an example of applying the solution, we have applied the model to build a password attack detection application that protects FTP servers and employs this application on an actual network to evaluate  ... 
doi:10.5121/ijcnc.2019.11605 fatcat:ydqacsprqbcj7dn7ntzf4m6xfq

THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ANALYSIS AND CLUSTERING TECHNIQUES

Nguyen Hong Son, Ha Thanh Dung
2020 Zenodo  
The certainty of the solution comes from using the results of in-depth analysis of attack characteristics to build the detection capacity of the mechanism.  ...  In this context, consolidating password-based authentication mechanisms is critical, but monitoring measures for timely detection of attacks also play an important role in this battle.  ...  As an example of applying the solution, we have applied the model to build a password attack detection application that protects FTP servers and employs this application on an actual network to evaluate  ... 
doi:10.5281/zenodo.3598278 fatcat:alpdeddhebgi3citdbfxfbyyq4

First insights from a mobile honeypot

Matthias Wählisch, Sebastian Trapp, Christian Keil, Jochen Schönfelder, Thomas C. schmidt, Jochen Schiller
2012 Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '12  
We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devices.  ...  Based on a mobile honeypot that extracts first statistical results, our findings indicate that a few topological domains of the Internet have started to place particular focus on attacking mobile networks  ...  Our preliminary results for an UMTS-connected device show that on the overall offenders show an intensity similar to home networks, whereas regions and originators of attacks are better pronounced and  ... 
doi:10.1145/2342356.2342422 dblp:conf/sigcomm/WahlischTKSsS12 fatcat:73na4s4ewzcabpewbf3d3cmd44
« Previous Showing results 1 — 15 out of 129,646 results