Intelligent Security and Risk Analysis in Network Systems

被引:0
|
作者
Mohammadian, Masoud [1 ]
机构
[1] Univ Canberra, Sch Informat Syst & Accounting, Canberra, ACT 2606, Australia
关键词
Data and Network Security; Attack Graphs; Attack Paths; Fuzzy Logic; Decision Making; Genetic Algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security architects devote a considerable time and efforts in improving the security of their data and networks. Attack graph are graphical representation of networks that can assist in documenting risks in network systems. Attack graphs need to be analysed and tested to remove security risks in a network. All comprising paths identified on an attack graph are listed for close attention and consideration of how to protect against possible attacks. There is a need for an automated system that can generate and evaluate attack paths and provide security architects with decision making tools that provides them with details of paths that an attacker may take to attack a network and cause damage and security breaches in their networks. Such an automated system can provide paths that can cause the most undesirable attacks. In this research paper an automated system using Fuzzy Cognitive Maps developed by Mohammadian [3] for identifying attack paths from attack graphs are presented. A novel decision making approach to determine time delay for an attacker to reach resources in a network is considered. A multilayer Fuzzy Logic is employed for the development of calculation of time delay for an attacker to reach a resource once it has access to a network.
引用
收藏
页码:825 / 830
页数:6
相关论文
共 50 条
  • [41] Intelligent network infrastructure systems architecture and integration, risk management and validation
    Hooper, Emmanuel
    2007 1ST ANNUAL IEEE SYSTEMS CONFERENCE, 2007, : 165 - 171
  • [42] Designing a holistic end-to-end intelligent network analysis and security platform
    Alzahrani, M.
    2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
  • [43] Data Auditing for Intelligent Network Security Monitoring
    Hong, SeukGue
    Seo, HyungBin
    Yoon, MyungKeun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (03) : 74 - 79
  • [44] Application of intelligent agent in network payment security
    Shen, HZ
    Zhao, JD
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 437 - 440
  • [45] A Service of Home Security System on Intelligent Network
    Tsai, SM
    Yang, PC
    Wu, SS
    Sun, SS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1998, 44 (04) : 1360 - 1366
  • [46] GUEST EDITORIAL: INTELLIGENT NETWORK SECURITY AND SURVIVABILITY
    Walkowiak, Krzysztof
    Wozniak, Michal
    CYBERNETICS AND SYSTEMS, 2013, 44 (6-7) : 467 - 468
  • [47] A service of home security system on intelligent network
    Tsai, SM
    Yang, PC
    Wu, SS
    Sun, SS
    ISCE '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, 1997, : 79 - 82
  • [48] Intelligent evaluation of computer network security based on neural network
    Wang, Longge
    Yu, Junyang
    Qiao, Baojun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (03) : 2887 - 2891
  • [49] Security of Intelligent Building Network Based on Wireless Sensor Network
    Xu, Shuang
    Zhou, Tong
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (06) : 151 - 164
  • [50] The risk analysis of WLAN security systems for organizations in Thailand
    Apinantrakul, Rattaya
    Malisuwan, Settapong
    Kasemsan, Kulthon
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 564 - +