ABSTRACT
The operation of cyber security has gradually become a significant part of informatization in the process of smart campus construction. However, universities rely too much on physical security devices in the current network security operation process, and lack of self-defined statistical analysis automation program. The current network logs have the following problems: difficult to gather data-sets of different application systems, difficult to unify attribute names of different data-sets, difficult to count the number of records with attacker and victim as the only items, and besieged to do repetitive work daily. In order to solve the above problems, this paper proposes an automatic statistical threatening IP algorithm, which can uniquely locate the attacker and victim and process other data through a programmatic way. Finally, it is used to report statistical data to departments related to cyber security. The results of experiment show that the proposed algorithm can effectively complete the statistical work of network attack threatening IP details.
- Al'Aziz B, Sukarno P, Wardana A A. (2020). Blacklisted IP Distribution System to handle DDoS attacks on IPS Snort based on Blockchain. 2020 6th Information Technology International Seminar (ITIS), 41-45.Google Scholar
- Li T, Li J, Liu Z L, Li P, Jia C F. (2018). Differentially private Naive Bayes learning over multiple data sources. Information Sciences. 444:89-104.Google ScholarCross Ref
- Tabash M, Allah M A, Tawfik B. (2020). Intrusion Detection Model Using Naive Bayes and Deep Learning Technique. International Arab Journal of Information Technology, 17(2):215-224.Google ScholarCross Ref
- Kumar BJS, Anaswara PP. (2018). Vulnerability detection and prevention of SQL injection. International Journal of Engineering and Technology, 7(2.31):16-18.Google Scholar
- Yunus M, Brohan M Z, Nawi N M, Surin E (2018). Review of SQL injection: problems and prevention.International Journal on Informatics Visualization.2(3-2):215-219.Google Scholar
- Licui M. (2017). Research on key technologies of security for smart grid.BeijingJiaotong University.1-12. (in chinese).M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.Google Scholar
- Park M C, Dong H L. (2020). Random CFI (RCFI):efficient fine-grained control-flow integrity through random verification. IEEE Transactions on Computers, 99:1-1.Google Scholar
- Shangru Z, Xuejun L,Yue F, (2019). A survey on automated exploit generation. Journal of Computer Research and Development.56(10):2097-2111. (in chinese).Google Scholar
- Khalil I, Khreishah A, Azeem M. (2014). Cloud computing security:A survey. Computers, 3(1):1-35.Google ScholarCross Ref
- Zand A, Modelo-Howard G, Tongaonker A, (2017). Demystifying DDoS as a service. IEEE Communications Magazine,55(7):14-21.Google ScholarDigital Library
- Statistical Analysis of threatening IP in Universities Based Automated Script
Recommendations
Ant-based IP traceback
The denial-of-service (DoS) attacks with the source IP address spoofing techniques has become a major threat to the Internet. An intrusion detection system is often used to detect DoS attacks and to coordinate with the firewall to block them. However, ...
History and Future of Automated Vulnerability Analysis
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and TechnologiesThe software upon which our modern society operates is riddled with security vulnerabilities. These vulnerabilities allow hackers access to our sensitive data and make our system insecure. To identify vulnerabilities in software, human experts, or ...
NS-2 based IP traceback simulation against reflector based DDoS attack
AIS'04: Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy SystemsReflector attack belongs to one of the most serious types of Distributed Denial-of-Service (DDoS) attacks, which can hardly be traced by traceback techniques, since the marked information written by any routers between the attacker and the reflectors ...
Comments