An integrated vulnerability-based detection/interception model for the protection of regional infrastructure from covert attack
نویسندگان
چکیده
The expanse of U.S. transportation systems has helped to facilitate persistent national economic growth, its ease of access and reliability vital to the plethora of users who utilize daily the established infrastructure. Recent events have shown cause for concern, however, as the vulnerability inherent in such transportation systems has been exploited by the calculated attacks of highly motivated individuals and groups who have used these networks to target the connected critical infrastructure and human populations. This paper introduces a modified shortest path network interdiction formulation for the placement on detection sensors within a geographic region of interest in lieu of direct placement (or interdiction) of network arcs to assess regional network vulnerability. An integrated interception team model uses these resource location results to allocate interception units on the network and analyze their effectiveness in responding to generated sensor alarms. The p-Median problem and hypercube spatial queuing model are adapted to locate units and assess interception performance respectively. A demonstrative case analysis is offered for the region of Lancaster – Palmdale, CA.
منابع مشابه
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملA Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملVarious OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack
Wireless sensor networks are networks having non wired infrastructure and dynamic topology. In OSI model each layer is prone to various attacks, which halts the performance of a network .In this paper several attacks on four layers of OSI model are discussed and security mechanism is described to prevent attack in network layer i.e wormhole attack. In Wormhole attack two or more malicious nodes...
متن کامل