【24h】

Efficient Techniques for Network Attack Identification

机译:网络攻击识别的有效技术

获取原文
获取原文并翻译 | 示例

摘要

The ubiquity of the Internet has set off an explosion in the number of networked applications developed for the consumption of users. Unfortunately, many are maliciously designed to harm network infrastructure and systems. Considerable effort has been focused on detecting attacks by such applications that are known as malware, and predicting the breaches in security rendered by them. However, large networks pose a formidable challenge to representing and analyzing such attacks using scalable models. Furthermore, the availability of only partial information on the vulnerabilities admitted by a large fraction of the networked systems makes forecasting the future targets of such applications equally hard. In this paper, we present innovative methods to identify and characterize network attacks, and to forecast their propagation over time.
机译:Internet的普遍性引发了为用户的消费而开发的联网应用程序的爆炸式增长。不幸的是,许多恶意设计旨在损害网络基础架构和系统。大量的精力集中在检测被称为恶意软件的此类应用程序进行的攻击上,并预测它们造成的安全漏洞。但是,大型网络给使用可伸缩模型表示和分析此类攻击提出了巨大的挑战。此外,有关大部分网络系统所接受的漏洞的仅部分信息的可用性使预测此类应用程序的未来目标同样困难。在本文中,我们提出了创新的方法来识别和表征网络攻击,并预测其随时间的传播。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号