Abstract
Recent research in cybersecurity models the nature of attacks as graphs consisting of nodes that represent attacks and their properties, forming attack profiles. We examine the relationships between attack profiles based on established properties of the attacks to reduce the amount of information present in the graph and make them more applicable to cloud and big data environments. This is done by using multiplex networks, which are constructed based on the individual properties of cyber-attacks and reasoning rules enhanced with semantics and context to generate a multiplex semantic link network (mSLN). This paper presents an approach to generate mSLNs and it is evaluated with specific datasets.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
De Domenico, M., Sole-Ribalta, A., Omodei, E., Gomez, S., Arenas, A.: Centrality in Interconnected Multilayer Networks. arXiv.org, 12 November 2013. doi:10.1038/ncomms7868
Zimmermann, A., Lorenz, A., Oppermann, R.: An operational definition of context. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds.) CONTEXT 2007. LNCS (LNAI), vol. 4635, pp. 558–571. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74255-5_42
Zhuge, H.: Communities and emerging semantics in semantic link network: discovery and learning. IEEE Trans. Knowl. Data Eng. 21(6), 785–799 (2009). doi:10.1109/TKDE.2008.141
De Domenico, M., Nicosia, V., Arenas, A., Latora, V.: Layer aggregation and reducibility of multilayer interconnected networks. CoRR Abs/1409.5253, physics.soc-ph, 6864 (2014). doi:10.1038/ncomms7864
Radicchi, F., Arenas, A.: Abrupt transition in the structural formation of interconnected networks. arXiv.org, 17 July 2013. doi:10.1038/nphys2761
Aleroud, A.F. Contextual information fusion for the detection of cyber-attacks (2014)
Ding, T., Aleroud, A., Karabatis, G.: Multi-granular aggregation of network flows for security analysis. In: ISI, pp. 173–175 (2015). doi:10.1109/ISI.2015.7165965
Karabatis, G.: Using semantic networks and context in search for relevant software engineering artifacts (2009)
Lee, K.-M., Min, B., Goh, K.-I.: Towards real-world complexity: an introduction to multiplex networks. CoRR Abs/1502.03909 88(2), 48 (2015). doi:10.1140/epjb/e2015-50742-1
Aleroud, A., Karabatis, G., Sharma, P., He, P.: Context and semantics for detection of cyber attacks. Int. J. Inf. Comput. Secur. 6(1), 63 (2014). doi:10.1504/IJICS.2014.059791
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Pillai, M., Karabatis, G. (2016). Using Multiplex Networks to Model Cybersecurity Attack Profiles. In: Debruyne, C., et al. On the Move to Meaningful Internet Systems: OTM 2016 Conferences. OTM 2016. Lecture Notes in Computer Science(), vol 10033. Springer, Cham. https://doi.org/10.1007/978-3-319-48472-3_58
Download citation
DOI: https://doi.org/10.1007/978-3-319-48472-3_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48471-6
Online ISBN: 978-3-319-48472-3
eBook Packages: Computer ScienceComputer Science (R0)