Using Multiplex Networks to Model Cybersecurity Attack Profiles

被引:2
|
作者
Pillai, Manesh [1 ]
Karabatis, George [1 ]
机构
[1] UMBC, Dept Informat Syst, 1000 Hilltop Circle, Baltimore, MD 21250 USA
关键词
D O I
10.1007/978-3-319-48472-3_58
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research in cybersecurity models the nature of attacks as graphs consisting of nodes that represent attacks and their properties, forming attack profiles. We examine the relationships between attack profiles based on established properties of the attacks to reduce the amount of information present in the graph and make them more applicable to cloud and big data environments. This is done by using multiplex networks, which are constructed based on the individual properties of cyber-attacks and reasoning rules enhanced with semantics and context to generate a multiplex semantic link network (mSLN). This paper presents an approach to generate mSLNs and it is evaluated with specific datasets.
引用
收藏
页码:918 / 933
页数:16
相关论文
共 50 条
  • [1] Cybersecurity Attack Detection Model, Using Machine Learning Techniques
    Avci, Isa
    Koca, Murat
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (07) : 29 - 44
  • [2] Using the Cybersecurity Kill Chain for Attack and Defence
    Cooper M.
    ITNOW, 2022, 64 (02) : 38 - 41
  • [3] Vital layer nodes of multiplex networks for immunization and attack
    Zhao, Dawei
    Wang, Lianhai
    Xu, Shujiang
    Liu, Guangqi
    Han, Xiaohui
    Li, Shudong
    CHAOS SOLITONS & FRACTALS, 2017, 105 : 169 - 175
  • [4] Optimal Cybersecurity Investments Using SIS Model: Weakly Connected Networks
    Van Sy Mai
    La, Richard J.
    Battou, Abdella
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6097 - 6102
  • [5] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
    Bhardwaj, Sonam
    Dave, Mayank
    TELECOMMUNICATION SYSTEMS, 2024, 85 (04) : 601 - 621
  • [6] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
    Sonam Bhardwaj
    Mayank Dave
    Telecommunication Systems, 2024, 85 : 601 - 621
  • [7] Optimal Cybersecurity Investments in Large Networks Using SIS Model: Algorithm Design
    Mai, Van Sy
    La, Richard J.
    Battou, Abdella
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (06) : 2453 - 2466
  • [8] Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
    Khandpur, Rupinder Paul
    Ji, Taoran
    Jan, Steve
    Wang, Gang
    Lu, Chang-Tien
    Ramakrishnan, Naren
    CIKM'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2017, : 1049 - 1057
  • [9] Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification
    Al Hwaitat, Ahmad K.
    Fakhouri, Hussam N.
    APPLIED SCIENCES-BASEL, 2024, 14 (19):
  • [10] Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 2527 - +