Implementation of an IP Management and Risk Assessment System Based on PageRank

被引:0
作者
Hou, Chia-Ling [1 ]
Kuo, Cheng-Chung [1 ]
Liu, I-Hsien [1 ]
Yang, Chu-Sing [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Elect Engn, Inst Comp & Commun Engn, Tainan, Taiwan
来源
SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES | 2020年 / 895卷
关键词
NIDS; HIDS; Risk assessment; INTRUSION DETECTION;
D O I
10.1007/978-3-030-16946-6_34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, network technology had brought a variety of attacks on the Internet, unfortunately, no one is safe in this trend. Network managers try to find the attackers and search for the suspicious behaviors in the network connections to defend their services. Intrusion Detection System (IDS) can help network managers to find out the network attacks, but for some special cases, IDS has its limitation. Proposed system integrated network-based IDS (NIDS) and hostbased IDS (HIDS) to detect the suspicious behavior and assess the risk value of each IP. This research is dedicated to separating attacks and suspicious behaviors analysis by network-based IDS and host-based IDS. Furthermore, the proposed system will also find the relations among suspicious IP by using the modified PageRank algorithm and correlate the events to estimate the risk for each IP. The ranking of each IP represent the risk level and network managers can protect the hosts by the ranking. The experiment results show that the proposed system can achieve the goal of managing attack and tracking the suspicious ones. It can help users to take appropriate action in time.
引用
收藏
页码:438 / 450
页数:13
相关论文
共 15 条
  • [1] [Anonymous], 2018, RISK MANAGEMENT ISO
  • [2] [Anonymous], 2018, LIACS LEID NL
  • [3] Decision Networks for Security Risk Assessment of Critical Infrastructures
    Codetta-Raiteri, Daniele
    Portinale, Luigi
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (03)
  • [4] WannaCry, Cybersecurity and Health Information Technology: A Time to Act
    Ehrenfeld, Jesse M.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (07)
  • [5] Kuo C., 2015, DESIGN IMPLEMENTATIO
  • [6] Lazarevic A, 2005, MASSIVE COMP, V5, P19, DOI 10.1007/0-387-24230-9_2
  • [7] An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking
    Li, Senyu
    Bi, Fangming
    Chen, Wei
    Miao, Xuzhi
    Liu, Jin
    Tang, Chaogang
    [J]. IEEE ACCESS, 2018, 6 : 10311 - 10319
  • [8] Intrusion detection system: A comprehensive review
    Liao, Hung-Jen
    Lin, Chun-Hung Richard
    Lin, Ying-Chih
    Tung, Kuang-Yuan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 16 - 24
  • [9] Narayanaswamy K., 2014, U.S. Patent, Patent No. [8,789,173, 8789173]
  • [10] Page L., 1999, The PageRank citation ranking: Bringing order to the web