Reference Hub9
Investigation Approach for Network Attack Intention Recognition

Investigation Approach for Network Attack Intention Recognition

Abdulghani Ali Ahmed
Copyright: © 2017 |Volume: 9 |Issue: 1 |Pages: 22
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522512271|DOI: 10.4018/IJDCF.2017010102
Cite Article Cite Article

MLA

Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." IJDCF vol.9, no.1 2017: pp.17-38. http://doi.org/10.4018/IJDCF.2017010102

APA

Ahmed, A. A. (2017). Investigation Approach for Network Attack Intention Recognition. International Journal of Digital Crime and Forensics (IJDCF), 9(1), 17-38. http://doi.org/10.4018/IJDCF.2017010102

Chicago

Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition," International Journal of Digital Crime and Forensics (IJDCF) 9, no.1: 17-38. http://doi.org/10.4018/IJDCF.2017010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Sensitive information has critical risks when transmitted through computer networks. Existing protection systems still have limitations with treating network information with sufficient confidentiality, integrity, and availability. The rapid development of network technologies helps increase network attacks and hides their malicious intentions. Attack intention is the ultimate attack goal that the attacker attempts to achieve by executing various intrusion methods or techniques. Recognizing attack intentions helps security administrator develop effective protection systems that can detect network attacks that have similar intentions. This paper analyses attack types and classifies them according to their malicious intent. An investigation approach based on similarity metric is proposed to recognize attacker plans and predict their intentions. The obtained results demonstrate that the proposed approach is capable of investigating similarity of attack signatures and recognizing the intentions of Network attack.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.