Using Multiplex Networks to Model Cybersecurity Attack Profiles

被引:2
|
作者
Pillai, Manesh [1 ]
Karabatis, George [1 ]
机构
[1] UMBC, Dept Informat Syst, 1000 Hilltop Circle, Baltimore, MD 21250 USA
关键词
D O I
10.1007/978-3-319-48472-3_58
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research in cybersecurity models the nature of attacks as graphs consisting of nodes that represent attacks and their properties, forming attack profiles. We examine the relationships between attack profiles based on established properties of the attacks to reduce the amount of information present in the graph and make them more applicable to cloud and big data environments. This is done by using multiplex networks, which are constructed based on the individual properties of cyber-attacks and reasoning rules enhanced with semantics and context to generate a multiplex semantic link network (mSLN). This paper presents an approach to generate mSLNs and it is evaluated with specific datasets.
引用
收藏
页码:918 / 933
页数:16
相关论文
共 50 条
  • [41] Cybersecurity in Educational Networks
    Burov, Oleksandr
    Lytvynova, Svitlana
    Lavrov, Evgeniy
    Krylova-Grek, Yuliya
    Orliyk, Olena
    Petrenko, Sergiy
    Shevchenko, Svitlana
    Tkachenko, Oleksii M.
    INTELLIGENT HUMAN SYSTEMS INTEGRATION 2020, 2020, 1131 : 359 - 364
  • [42] Optimal Disintegration Strategy in Multiplex Networks under Layer Node-Based Attack
    Qi, Mingze
    Bai, Yu
    Li, Xiaohan
    Deng, Hongzhong
    Wang, Tao
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [43] Cybersecurity: A Survey of Vulnerability Analysis and Attack Graphs
    Lahcen, Rachid Ait Maalem
    Mohapatra, Ram
    Kumar, Manish
    MATHEMATICS AND COMPUTING (ICMC 2018), 2018, 253 : 97 - 111
  • [44] Cybersecurity Lessons From the Change Healthcare Attack
    Neprash, Hannah T.
    Dameff, Christian
    Tully, Jeffrey
    JAMA INTERNAL MEDICINE, 2024, 184 (11) : 1283 - 1284
  • [45] Different Attack and Defense Types for AI Cybersecurity
    Zou, Jing
    Zhang, Shungeng
    Qiu, Meikang
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT III, KSEM 2024, 2024, 14886 : 179 - 192
  • [46] Throwback Attack How Stuxnet changed cybersecurity
    Capano, Daniel E.
    Control Engineering, 2023, 70 (01) : 43 - 46
  • [47] Knowledge Mining in Cybersecurity: From Attack to Defense
    Akbar, Khandakar Ashrafi
    Halim, Sadaf Md
    Hu, Yibo
    Singhal, Anoop
    Khan, Latifur
    Thuraisingham, Bhavani
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 110 - 122
  • [48] Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
    Ten, Chee-Wooi
    Manimaran, Govindarasu
    Liu, Chen-Ching
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2010, 40 (04): : 853 - 865
  • [49] Identifying endotypes of individuals after an attack of pancreatitis based on unsupervised machine learning of multiplex cytokine profiles
    Kimita, Wandia
    Bharmal, Sakina H.
    Ko, Juyeon
    Petrov, Maxim S.
    TRANSLATIONAL RESEARCH, 2023, 251 : 54 - 62
  • [50] Multilayered Attack-Defense Model on Networks
    Perevozchikov, A. G.
    Reshetov, V. Yu
    Yanochkin, I. E.
    COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2019, 59 (08) : 1389 - 1397