Models for Threat Assessment in Networks

نویسنده

  • Melissa Danforth
چکیده

Central to computer security are detecting attacks against systems and managing computer systems to mitigate threats to the system. Attacks exploit vulnerabilities in the system such as a programming flaw. Threats are vulnerabilities which could lead to an attack under certain circumstances. The key to the detection of attacks is discovering an ongoing attack against the system. Mitigating threats involves a continuous assessment of the vulnerabilities in the system and of the risk these vulnerabilities pose with respects to a security policy. Intrusion detection systems (IDS) are programs which detect attacks. The goal is to issue alerts only when an actual attack occurs, but also to not miss any attacks. The biological immune system provides a compelling model on which to base an IDS. This work adds the biological concepts of positive selection and collaboration to artificial immune systems to achieve a better attack detection rate without unduly raising the false alarm rate. Attack graphs assess the threat to the system by showing the composition of vulnerabilities in the system. The key issues with attack graphs are scalability to large networks, ease of coding new attacks into the model, incomplete network information, visualization of the graph and automatic analysis of the graph. This work presents an abstract class model that aggregates individual attacks into abstract classes. Through these abstractions, scalability is greatly increased and the codification of new attacks into the model is made easier when compared to the current approach that models each attack. Clustering of identical machines is used to reduce the visual complexity of the graph and also to increase scalability. Incomplete network information is handled Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE SEP 2006 2. REPORT TYPE 3. DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Models for Threat Assessment in Networks 5a. CONTRACT NUMBER

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Health Directors and Experts, and Proper Need Assessment Models

Introduction. Need Assessment is an inseparable element of educational planning and optimization of human resources. Identifying educational needs can increase the efficacy of educational plans. The goal of this research was to investigate the characteristics of an appropriate need assessment model and also determine the most applicable need assessment models according to the viewpoints of heal...

متن کامل

A novel ranking method for intuitionistic fuzzy set based on information fusion and application to threat assessment

A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...

متن کامل

NEURAL NETWORK-BASED RELIABILITY ASSESSMENT OF OPTIMALLY SEISMIC DESIGNED MOMENT FRAMES

In the present study, the reliability assessment of performance-based optimally seismic designed reinforced concrete (RC) and steel moment frames is investigated. In order to achieve this task, an efficient methodology is proposed by integrating Monte Carlo simulation (MCS) and neural networks (NN). Two NN models including radial basis function (RBF) and back propagation (BP) models are examine...

متن کامل

بررسی تأثیر برخی شاخص‌های کیفیت آب زیرزمینی بر بیابان‌زایی اراضی دشت سگزی اصفهان با استفاده از Bayesian Belief Networks

This paper aimed to assess the severity of desertification in Segzi plain located in the eastern part of Isfahan city, focusing on groundwater quality criteria used in MEDALUS model. Bayesian Belief networks (BBNs) were also used to convert MEDALUS model into a predictive, cause and effects model. Different techniques such as Kriging and IDW were applied to water quality data of 12 groundwater ...

متن کامل

AN EXTENDED FUZZY ARTIFICIAL NEURAL NETWORKS MODEL FOR TIME SERIES FORECASTING

Improving time series forecastingaccuracy is an important yet often difficult task.Both theoretical and empirical findings haveindicated that integration of several models is an effectiveway to improve predictive performance, especiallywhen the models in combination are quite different. In this paper,a model of the hybrid artificial neural networks andfuzzy model is proposed for time series for...

متن کامل

Wavelet Neural Network Using Multiple Wavelet Functions in Target Threat Assessment

Target threat assessment is a key issue in the collaborative attack. To improve the accuracy and usefulness of target threat assessment in the aerial combat, we propose a variant of wavelet neural networks, MWFWNN network, to solve threat assessment. How to select the appropriate wavelet function is difficult when constructing wavelet neural network. This paper proposes a wavelet mother functio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006