Attack intention recognition: A review

被引:25
作者
Ahmed A.A. [1 ]
Zaman N.A.K. [1 ]
机构
[1] Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang, Gambang, Pahang
关键词
Attack intention recognition; Causal network approach; Cyber security; Network forensics;
D O I
10.6633/IJNS.201703.19(2).09
中图分类号
学科分类号
摘要
Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has only helped increase network attacks and hide their malicious intent. This paper analyzes attack types and classifies them according to their intent. A causal network approach is used to recognize attackers' plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system.
引用
收藏
页码:244 / 250
页数:6
相关论文
共 22 条
  • [1] Ahmed A.A., Jantan A., Rasmi M., Service violation monitoring model for detecting and tracing bandwidth abuse, Journal of Network and Systems Management, 21, 2, pp. 218-237, (2013)
  • [2] Ahmed A.A., Jantan A., Wan T.C., Sla-based complementary approach for network intrusion detection, Computer Communications, 34, 14, pp. 1738-1749, (2011)
  • [3] Ahmed A.A., Jantan A., Wan T.C., Real-time detection of intrusive traffic in qos network domains, IEEE Security & Privacy, 11, 6, pp. 45-53, (2013)
  • [4] Ahmed A.A., Jantan A., Wan T.C., Filtration model for the detection of malicious traffic in large-scale networks, Computer Communications, 82, 59-70, pp. 15-23, (2015)
  • [5] Ahmed A.A., Sadiq A.S., Zolkipli M.F., Traceback model for identifying sources of distributed attacks in real time, Security and Communication Networks, (2016)
  • [6] Chandran R., Yan W.Q., A comprehensive survey of antiforensics for network security, Managing Trust in Cyberspace, pp. 419-447, (2013)
  • [7] Che T.W., Ma J.F., Li N., Wang C., A security quantitative analysis method for access control based on security entropy, International Journal of Network Security, 17, 5, pp. 517-521, (2015)
  • [8] Gupta B.B., Joshi R.C., Misra M., Ann based scheme to predict number of zombies in a ddos attack, International Journal of Network Security, 14, 2, pp. 61-70, (2012)
  • [9] Hwang M.S., Lee C.C., Research issues and challenges for multiple digital signatures, International Journal of Network Security, 1, 1, pp. 1-7, (2005)
  • [10] Lee C.C., Hwang M.S., Liao I.E., On the security of self-certified public keys, International Journal of Information Security and Privacy, 5, 2, pp. 55-62, (2011)