Skip to main content

Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

Abstract

Information protection for information systems is the major concern for most of the institutes, but there are a limited number of activities for the prevention of intrusion. Though each institute establishes and operates information protection solutions such as information security control systems, counter-measures against intrusions are generally applied only after intrusions have taken place in most cases. Delayed counter-measures lead to delays in damage recovery as well as failure of timely actions to mitigate the damages. In this paper, we propose the design of an online intrusion forecast system using a weather forecasting model, allowing administrators to minimize the effects of damages in advance through an online intrusion prediction of the probable vulnerability and risks. Both the information from the sensors of information security control systems and the profiles of the information system assets are used to analyze vulnerabilities and to predict intrusion routes and the scope of damages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CERT CC, http://www.cert.org

  2. Zou, C.C., Gang, W., Towsley, D.: Code Red Worm Propagation Modeling and Analysis. In: 9th ACM Conference on Computer and Communication Security (CCS 2002), Washington DC, USA, November 18-22 (2002)

    Google Scholar 

  3. Dubendorfer, T., Wagner, A., Plattner, B.: An Economic Damage Model for Large Scale Internet Attacks. In: Proceedings of the 13th IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprise (WET ICE 2004), pp. 1524–1547 (2004)

    Google Scholar 

  4. Open Web Application Security Project, http://www.owasp.org

  5. Pikoulas, J., Buchanan, W.J., Mannion, M., Triantafyllopoulos, K.: An agent-based Bayesian forecasting model for enhanced network security. In: Proceedings of Eighth Annual IEEE International Conference and Workshop Engineering of Computer Based Systems, ECBS 2001 (April 2001)

    Google Scholar 

  6. In, H.P., Kim, Y.-G., Lee, T., Moon, C.-J., Jung, Y., Kim, I.: Security Risk Analysis Model for Information Systems. In: Third Asian Simulation Conference Systems Modeling and Simulation: Theory and Applications, AsianSim 2004. LNCS, vol. 3398. Springer, Heidelberg (2004)

    Google Scholar 

  7. Kim, I., Jung, Y.J., Park, J.G., Won, D.: A Study on Security Risk Modeling over Information and Communication Infrastructure. In: SAM 2004, pp. 249–253 (2004)

    Google Scholar 

  8. Bang, Y.-H., Jung, Y.J., Kim, I., Lee, N., Lee, G.: Design and Development of a Risk Analysis Automatic Tool. In: ICCSA 2004. LNCS, vol. 3043, pp. 491–499. Springer, Heidelberg (2004)

    Google Scholar 

  9. Chung, Y.J., Kim, I.J., Lee, N. H., Lee, T., In, H.P.: Security risk vector for quantitative asset assessment. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 274–283. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Kim, I.J., Chung, Y.-J., Lee, Y., Won, D.H.: A time-variant risk analysis and damage estimation for large-scale network systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 92–101. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Forum of Incident Response and Security Teams, http://www.first.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chung, Y., Kim, I., Lee, C., Im, E.G., Won, D. (2006). Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_84

Download citation

  • DOI: https://doi.org/10.1007/11751632_84

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics