Poster: Attack Survivability Prediction

نویسندگان

  • Jaime C. Acosta
  • Brenda G. Medina
چکیده

Survivability analysis focuses on the ability of network entities to function during incidents such as attacks. Currently, testing survivability of mobile ad hoc networks consists of running scenarios with several configurations, often thousands, to obtain an understanding of the impacts of an attack. This process is very latent, choice of configurations are subjective or random, and results do not generalize to different scenarios. Focusing on these problems, our work-in-progress is towards a previously unexplored field of research: efficient attack survivability analysis via machine learning and an attacker-centric network representation. Using a collected dataset, we provide some evidence showing that the network representation is suitable for creating an attack survivability predictor.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of an Ensemble Multi-stage Machine for Prediction of Breast Cancer Survivability

Prediction of cancer survivability using machine learning techniques has become a popular approach in recent years. ‎In this regard, an important issue is that preparation of some features may need conducting difficult and costly experiments while these features have less significant impacts on the final decision and can be ignored from the feature set‎. ‎Therefore‎, ‎developing a machine for p...

متن کامل

Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models

vii 1 Survivable System Concepts 1 2 Service Traces for Survivability Specification 5 2.1 Essential-Service Workflows 5 2.2 Essential-Service Traces 6 2.3 Relational Specification of Trace Components 6 2.4 Computational Survivability 7 3 Intrusion Traces for Adverse Environment Specification 9 3.1 Intruder Workflows Organized Into Attack Trees 10 3.2 Attack Patterns Organized Into Attack Profil...

متن کامل

Attack Recognition for System Survivability: A Low-level Approach

This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognition” and discuss how our approach fits the requirements. Empirical results are given along with an estimate of the measured performance. Other work is reviewed within the context of attack recognition for survivability.

متن کامل

On the Performance of a Survivability Architecture for Networked Computing Systems

This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel attack signatures and survivability handlers. Higher level survivability mechanisms are implemented using migratory autonomous agents. The potential for fast response to, and recovery from, malicious attacks is the m...

متن کامل

Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning

DDoS defense nowadays relies on expensive and proprietary hardware appliances. When a massive attack begins, improper choices such as choosing fewer appliances or those without enough capacity may lead to more severe damage. As the previous work proposed[1], the choice heavily depends on the peak volume of the attack traffic(measured by packets per second). However, no prediction methods have b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012