Using Multiplex Networks to Model Cybersecurity Attack Profiles

被引:2
|
作者
Pillai, Manesh [1 ]
Karabatis, George [1 ]
机构
[1] UMBC, Dept Informat Syst, 1000 Hilltop Circle, Baltimore, MD 21250 USA
关键词
D O I
10.1007/978-3-319-48472-3_58
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research in cybersecurity models the nature of attacks as graphs consisting of nodes that represent attacks and their properties, forming attack profiles. We examine the relationships between attack profiles based on established properties of the attacks to reduce the amount of information present in the graph and make them more applicable to cloud and big data environments. This is done by using multiplex networks, which are constructed based on the individual properties of cyber-attacks and reasoning rules enhanced with semantics and context to generate a multiplex semantic link network (mSLN). This paper presents an approach to generate mSLNs and it is evaluated with specific datasets.
引用
收藏
页码:918 / 933
页数:16
相关论文
共 50 条
  • [31] Building and Evaluating User Network Profiles for Cybersecurity Using Serverless Architecture
    Parres-Peredo, Alvaro
    Piza-Davila, Ivan
    Cervantes, Francisco
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 164 - 167
  • [32] Cybersecurity Framework Adoption: Using Capability Levels for Implementation Tiers and Profiles
    Dedeke, Adenekan
    IEEE SECURITY & PRIVACY, 2017, 15 (05) : 47 - 54
  • [33] An Innovative Way to Model Twitter Topic-Driven Interactions Using Multiplex Networks
    Hanteer, Obaida
    Rossi, Luca
    FRONTIERS IN BIG DATA, 2019, 2
  • [34] Cybersecurity in social networks: An ensemble model for Twitter bot detection
    Darem, Abdulbasit A.
    Alhashmi, Asma A.
    Alanazi, Meshari H.
    Alanezi, Abdullah F.
    Said, Yahia
    Darem, Laith A.
    Hussain, Maher M.
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2024, 11 (11): : 130 - 141
  • [35] Computer Networks Cybersecurity Monitoring Based on Deep Learning Model
    Alguliyev, Rasim
    Shikhaliyev, Ramiz
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [36] Research on MTD cybersecurity evaluation technology for information system's attack surface model
    Bin, Dongmei
    Tang, Fuchuan
    Yang, Chunyan
    Ling, Ying
    Li, Xin
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 657 - 661
  • [37] Model-based Attack Tree Generation for Cybersecurity Risk-Assessments in Automotive
    Kern, Matthias
    Liu, Bo
    Betancourt, Victor Pazmino
    Becker, Juergen
    7TH IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (IEEE ISSE 2021), 2021,
  • [38] Cybersecurity risk assessment method of ICS based on attack-defense tree model
    Wang, Shuang
    Ding, Lei
    Sui, He
    Gu, Zhaojun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (06) : 10475 - 10488
  • [39] Optimal Disintegration Strategy in Multiplex Networks:From an Edge-based Attack Perspective
    Wang, Chen
    Feng, Yuan
    Zeng, Chengyi
    Liu, Hongfu
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 788 - 794
  • [40] Analyzing multiplex networks using factorial methods
    Giordano, Giuseppe
    Ragozini, Giancarlo
    Vitale, Maria Prosperina
    SOCIAL NETWORKS, 2019, 59 : 154 - 170