Abstract
The rapid development of computer networks has accelerated the development of society, but also leads to much more frequent network attacks, and makes the attacks much more complex. Therefore, network intrusion detection becomes a great challenge to the security issue both in industry and academy. In this paper, we present network attacks detection and prediction method based on threat model, and then the network security trend is analyzed. The security situation of the entire network is analyzed by a quantitative situation evaluating model, cooperating with the network topology. The experiment results shows that, during its running in an intranet security guard system of a large enterprise in 2010, the next-step attack can be predicted by our algorithm, and the security situation of the entire network can be accurately evaluated as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Madhavan, J., Bernstein, P.A., Rahm, E.: Generic Schema Matching with Cupid. In: VLDB Conference, pp. 49–58 (2001)
Aumüller, D., Do, H.H., Massmann, S., Rahm, E.: Schema and ontology matching with COMA++. In: SIGMOD Conference, pp. 906–908 (2005)
Do, H.H., Rahm, E.: COMA: A System for Flexible Combination of Schema Matching Approaches. In: VLDB Conference, pp. 610–621 (2002)
Yang, S.J., Stotz, A., Holsopple, J., Sudit, M., Kuhl, M.: High level information fusion for tracking and projection of multistage cyber attacks. Information Fusion 10, 107–121 (2009)
Bremler-Barr, A., Hay, D., Koral, Y.: CompactDFA: Generic State Machine Compression for Scalable Pattern Matching. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)
Kedar, N., Girija, N.: Robust and Fast Pattern Matching for Intrusion Detection. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)
Zheng, K., Zhang, X., Cai, Z.: Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching. In: IEEE Communication Society Subject Matter Experts Publication in the IEEE INFOCOM 2010 Proceedings (2010)
Chen, F.: Multitarget attack graph based on a hierarchical network security risk assessment methods: [Ph.D Thesis]. National University of Defense Technology, Changsha (2009)
Gong, Z., Zhuo, Y.: Situational awareness of network. Journal of Software 21(7), 1605–1619 (2010)
Ma, D., Wang, Y., Fu, Z.: A synergetic pattern matching method based-on DHT structure for intrusion detection in large-scale network. Procedia Engineering 15, 3511–3515 (2011); 2011 International Conference on Advanced in Control Engineering and Information Science, CEIS 2011
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ma, D., Wang, Y., Huang, F., Fu, Z. (2012). Networks Intrusion Behavior Prediction Based on Threat Model. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-34041-3_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34040-6
Online ISBN: 978-3-642-34041-3
eBook Packages: Computer ScienceComputer Science (R0)