Skip to main content

Using Multiplex Networks to Model Cybersecurity Attack Profiles

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10033))

Abstract

Recent research in cybersecurity models the nature of attacks as graphs consisting of nodes that represent attacks and their properties, forming attack profiles. We examine the relationships between attack profiles based on established properties of the attacks to reduce the amount of information present in the graph and make them more applicable to cloud and big data environments. This is done by using multiplex networks, which are constructed based on the individual properties of cyber-attacks and reasoning rules enhanced with semantics and context to generate a multiplex semantic link network (mSLN). This paper presents an approach to generate mSLNs and it is evaluated with specific datasets.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. De Domenico, M., Sole-Ribalta, A., Omodei, E., Gomez, S., Arenas, A.: Centrality in Interconnected Multilayer Networks. arXiv.org, 12 November 2013. doi:10.1038/ncomms7868

  2. Zimmermann, A., Lorenz, A., Oppermann, R.: An operational definition of context. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds.) CONTEXT 2007. LNCS (LNAI), vol. 4635, pp. 558–571. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74255-5_42

    Chapter  Google Scholar 

  3. Zhuge, H.: Communities and emerging semantics in semantic link network: discovery and learning. IEEE Trans. Knowl. Data Eng. 21(6), 785–799 (2009). doi:10.1109/TKDE.2008.141

    Article  MathSciNet  Google Scholar 

  4. De Domenico, M., Nicosia, V., Arenas, A., Latora, V.: Layer aggregation and reducibility of multilayer interconnected networks. CoRR Abs/1409.5253, physics.soc-ph, 6864 (2014). doi:10.1038/ncomms7864

  5. Radicchi, F., Arenas, A.: Abrupt transition in the structural formation of interconnected networks. arXiv.org, 17 July 2013. doi:10.1038/nphys2761

    Google Scholar 

  6. Aleroud, A.F. Contextual information fusion for the detection of cyber-attacks (2014)

    Google Scholar 

  7. Ding, T., Aleroud, A., Karabatis, G.: Multi-granular aggregation of network flows for security analysis. In: ISI, pp. 173–175 (2015). doi:10.1109/ISI.2015.7165965

  8. Karabatis, G.: Using semantic networks and context in search for relevant software engineering artifacts (2009)

    Google Scholar 

  9. Lee, K.-M., Min, B., Goh, K.-I.: Towards real-world complexity: an introduction to multiplex networks. CoRR Abs/1502.03909 88(2), 48 (2015). doi:10.1140/epjb/e2015-50742-1

  10. Aleroud, A., Karabatis, G., Sharma, P., He, P.: Context and semantics for detection of cyber attacks. Int. J. Inf. Comput. Secur. 6(1), 63 (2014). doi:10.1504/IJICS.2014.059791

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George Karabatis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Pillai, M., Karabatis, G. (2016). Using Multiplex Networks to Model Cybersecurity Attack Profiles. In: Debruyne, C., et al. On the Move to Meaningful Internet Systems: OTM 2016 Conferences. OTM 2016. Lecture Notes in Computer Science(), vol 10033. Springer, Cham. https://doi.org/10.1007/978-3-319-48472-3_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48472-3_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48471-6

  • Online ISBN: 978-3-319-48472-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics