Abstract
Information protection for information systems is the major concern for most of the institutes, but there are a limited number of activities for the prevention of intrusion. Though each institute establishes and operates information protection solutions such as information security control systems, counter-measures against intrusions are generally applied only after intrusions have taken place in most cases. Delayed counter-measures lead to delays in damage recovery as well as failure of timely actions to mitigate the damages. In this paper, we propose the design of an online intrusion forecast system using a weather forecasting model, allowing administrators to minimize the effects of damages in advance through an online intrusion prediction of the probable vulnerability and risks. Both the information from the sensors of information security control systems and the profiles of the information system assets are used to analyze vulnerabilities and to predict intrusion routes and the scope of damages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CERT CC, http://www.cert.org
Zou, C.C., Gang, W., Towsley, D.: Code Red Worm Propagation Modeling and Analysis. In: 9th ACM Conference on Computer and Communication Security (CCS 2002), Washington DC, USA, November 18-22 (2002)
Dubendorfer, T., Wagner, A., Plattner, B.: An Economic Damage Model for Large Scale Internet Attacks. In: Proceedings of the 13th IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprise (WET ICE 2004), pp. 1524–1547 (2004)
Open Web Application Security Project, http://www.owasp.org
Pikoulas, J., Buchanan, W.J., Mannion, M., Triantafyllopoulos, K.: An agent-based Bayesian forecasting model for enhanced network security. In: Proceedings of Eighth Annual IEEE International Conference and Workshop Engineering of Computer Based Systems, ECBS 2001 (April 2001)
In, H.P., Kim, Y.-G., Lee, T., Moon, C.-J., Jung, Y., Kim, I.: Security Risk Analysis Model for Information Systems. In: Third Asian Simulation Conference Systems Modeling and Simulation: Theory and Applications, AsianSim 2004. LNCS, vol. 3398. Springer, Heidelberg (2004)
Kim, I., Jung, Y.J., Park, J.G., Won, D.: A Study on Security Risk Modeling over Information and Communication Infrastructure. In: SAM 2004, pp. 249–253 (2004)
Bang, Y.-H., Jung, Y.J., Kim, I., Lee, N., Lee, G.: Design and Development of a Risk Analysis Automatic Tool. In: ICCSA 2004. LNCS, vol. 3043, pp. 491–499. Springer, Heidelberg (2004)
Chung, Y.J., Kim, I.J., Lee, N. H., Lee, T., In, H.P.: Security risk vector for quantitative asset assessment. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 274–283. Springer, Heidelberg (2005)
Kim, I.J., Chung, Y.-J., Lee, Y., Won, D.H.: A time-variant risk analysis and damage estimation for large-scale network systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 92–101. Springer, Heidelberg (2005)
Forum of Incident Response and Security Teams, http://www.first.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chung, Y., Kim, I., Lee, C., Im, E.G., Won, D. (2006). Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_84
Download citation
DOI: https://doi.org/10.1007/11751632_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)