Skip to main content

Networks Intrusion Behavior Prediction Based on Threat Model

  • Conference paper
Book cover Information Computing and Applications (ICICA 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 308))

Included in the following conference series:

  • 1818 Accesses

Abstract

The rapid development of computer networks has accelerated the development of society, but also leads to much more frequent network attacks, and makes the attacks much more complex. Therefore, network intrusion detection becomes a great challenge to the security issue both in industry and academy. In this paper, we present network attacks detection and prediction method based on threat model, and then the network security trend is analyzed. The security situation of the entire network is analyzed by a quantitative situation evaluating model, cooperating with the network topology. The experiment results shows that, during its running in an intranet security guard system of a large enterprise in 2010, the next-step attack can be predicted by our algorithm, and the security situation of the entire network can be accurately evaluated as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Madhavan, J., Bernstein, P.A., Rahm, E.: Generic Schema Matching with Cupid. In: VLDB Conference, pp. 49–58 (2001)

    Google Scholar 

  2. Aumüller, D., Do, H.H., Massmann, S., Rahm, E.: Schema and ontology matching with COMA++. In: SIGMOD Conference, pp. 906–908 (2005)

    Google Scholar 

  3. Do, H.H., Rahm, E.: COMA: A System for Flexible Combination of Schema Matching Approaches. In: VLDB Conference, pp. 610–621 (2002)

    Google Scholar 

  4. Yang, S.J., Stotz, A., Holsopple, J., Sudit, M., Kuhl, M.: High level information fusion for tracking and projection of multistage cyber attacks. Information Fusion 10, 107–121 (2009)

    Article  Google Scholar 

  5. Bremler-Barr, A., Hay, D., Koral, Y.: CompactDFA: Generic State Machine Compression for Scalable Pattern Matching. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)

    Google Scholar 

  6. Kedar, N., Girija, N.: Robust and Fast Pattern Matching for Intrusion Detection. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)

    Google Scholar 

  7. Zheng, K., Zhang, X., Cai, Z.: Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)

    Google Scholar 

  8. Chen, F.: Multitarget attack graph based on a hierarchical network security risk assessment methods: [Ph.D Thesis]. National University of Defense Technology, Changsha (2009)

    Google Scholar 

  9. Gong, Z., Zhuo, Y.: Situational awareness of network. Journal of Software 21(7), 1605–1619 (2010)

    Google Scholar 

  10. Ma, D., Wang, Y., Fu, Z.: A synergetic pattern matching method based-on DHT structure for intrusion detection in large-scale network. Procedia Engineering 15, 3511–3515 (2011); 2011 International Conference on Advanced in Control Engineering and Information Science, CEIS 2011

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, D., Wang, Y., Huang, F., Fu, Z. (2012). Networks Intrusion Behavior Prediction Based on Threat Model. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34041-3_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34040-6

  • Online ISBN: 978-3-642-34041-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics