An intrusion intention analysis algorithm based on attack graph

被引:0
|
作者
Zhu Z. [1 ]
Chai G. [2 ]
机构
[1] Equipment and Training Management Center (Information Center), Quzhou College of Technology, Quzhou
[2] College of Electrical and Information Engineering, Quzhou University, Quzhou
关键词
Attack graph; Intrusion intention; Network security; Recognition algorithm;
D O I
10.46300/9106.2021.15.71
中图分类号
学科分类号
摘要
The discovery of intrusion intention is one of the challenging tasks faced by network security managers. To detect intrusion detections, this paper presents a domain-device attack graph, and collects and analyzes the underlying data of the network topology. On this basis, the attack graph Map was quantified by the Bayesian theory. The minimum weight spanning tree (Min-WFS) algorithm was adopted to automatically recognize the calculation cost of key devices in the network topology, providing an important basis for network maintenance. Experimental results show that the intrusion intentions can be effectively identified with the aid of the quantified domain-device attack graph Map, and this identification method is easy to implement. © 2021, North Atlantic University Union NAUN. All rights reserved.
引用
收藏
页码:643 / 650
页数:7
相关论文
共 50 条
  • [31] Research on network attack analysis method based on attack graph of absorbing Markov chain
    Kang H.
    Long M.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 122 - 135
  • [32] Searching Forward Complete Attack Graph Generation Algorithm Based on Hypergraph Partitioning
    Li, Heng
    Wang, Yongjun
    Cao, Yuan
    ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 107 : 27 - 38
  • [33] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph
    Zhang, Chunrui
    Wang, Shen
    Zhan, Dechen
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317
  • [34] A Hybrid Attack Graph Analysis Method based on Model Checking
    Ge, Yaogang
    Shen, Xiaomeng
    Xu, Bingfeng
    He, Gaofeng
    2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD, 2022, : 258 - 263
  • [35] Vulnerability analysis of industrial control system based on attack graph
    Feng, Dong-Qin (dqfeng@iipc.zju.edu.cn), 1600, Zhejiang University (48):
  • [36] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [37] DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization
    Patil, Rajendra Shivaji
    Kallman, Markus Dypbukt
    Fodor, Viktoria
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 466 - 473
  • [38] Multi-classification algorithm based on graph convolutional neural network for intrusion detection
    Ruiyan Du
    Minghui Huang
    Fulai Liu
    Signal, Image and Video Processing, 2025, 19 (6)
  • [39] Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network
    Liu, Jun
    Chen, Huiting
    Zhen, Zhong
    Sha, Mingbo
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 147 - 154
  • [40] Data recovery algorithm under intrusion attack for energy internet
    Deng, Song
    Yuan, Changan
    Yang, Lechan
    Qin, Xiao
    Zhou, Aihua
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 109 - 121