Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph

نویسندگان

چکیده

Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion detection. Many approaches which detect predict attacks been proposed recent times. One such approach graphs. The primary purpose graph not only but its next steps within network as well as. More specifically, depicts paths attacker may employ circumvent policies by exploiting interdependencies between vulnerabilities. extant graphs plagued few issues. Scalability just one main issues generation faces. This because used increases vulnerabilities network. This, turn, complexity amount time required generate graph. At present, studies subsequent during had manually assigned location analysis. In order overcome this limitation, present study recommends use intelligent agents reduce reachability calculating nodes using A* prune algorithm remove useless edges complexity. For analysis, random forest (RF) was detect, predict, dynamically ascertain results experiment revealed produced better

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Graph to Graph Database

Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types availa...

متن کامل

Using Data Analysis to Enhance Attack Trees

Attack trees are a powerful graphical tool to investigate the security of a system. Analysing attack trees is more useful when the probabilities for events in the tree are known. In this research the goal is to find methods to use data analysis to find these probabilities. These methods are tested on a dataset on ATM attacks, and an attack tree model of an ATM. The results of the test indicate ...

متن کامل

Heart attack or rhabdomyolysis?

 Statins are commonly used drugs in the treatment of hyperlipidemia (HL), despite some undesirable side effects. These range from mild symptoms such as myopathy, muscle weakness and myalgia to severe muscle weakness associated with chronic myopathy and acute renal failure (ARF) as a result of rhabdomyolysis. The most serious and deadly side effect of statins is rhabdomyolysis. The case presente...

متن کامل

Improved Generalized Birthday Attack

Let r, B and w be positive integers. Let C be a linear code of length Bw and subspace of F2. The k-regular-decoding problem is to find a nonzero codeword consisting of w length-B blocks with Hamming weight k. This problem was mainly studied after 2002. Not being able to solve this problem is critical for cryptography as it gives a fast attack against FSB, SWIFFT and learning parity with noise. ...

متن کامل

Improving Attack Graph Visualization through Data Reduction and Attack Grouping

Abstract. Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify port...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Karbala international journal of modern science

سال: 2022

ISSN: ['2405-609X', '2405-6103']

DOI: https://doi.org/10.33640/2405-609x.3235