首页> 外文会议>International Conference on e-Business and Telecommunications >USING ATTACK GRAPHS IN AD HOC NETWORKS: For Intrusion Prediction Correlation and Detection
【24h】

USING ATTACK GRAPHS IN AD HOC NETWORKS: For Intrusion Prediction Correlation and Detection

机译:在Ad Hoc网络中使用攻击图:用于入侵预测相关性和检测

获取原文

摘要

Ad hoc networks have lots of applications; However, a vital problem concerning their security aspects must be solved in order to realize these applications. Hence, there is a strong need for intrusion detection as a frontline security research area for ad hoc networks security. Among intrusion detection techniques, anomaly detection is advantageous since it does not need to store and regularly update profiles of known attacks. In addition the intrusion detection is not limited to the stored attack profiles, which allows the detection of new attacks. Therefore, anomaly detection is more suitable for the dynamic and limited resources nature of ad hoc networks. For appropriately constructed network models, attack graphs have shown their utility in organizing combinations of network attacks. In this paper, we suggest the use of attack graphs in ad hoc networks. As an example, we give an attack graph that we have created for the wormhole attack. For anomaly prediction, correlation, and detection in ad hoc networks, we suggest the use of two methods that rely basically on attack graphs. The first method is based on the attack graph adjacency matrix and helps in the prediction of a single or multiple step attack and in the categorization of intrusion alarms' relevance. The second method uses the attack graph distances for correlating intrusion events and building attack scenarios. Our approach is more appropriate to ad hoc networks' collaborative and dynamic nature, especially at the application level.
机译:ad hoc网络有很多应用;然而,必须解决有关其安全方面的重要问题,以实现这些应用程序。因此,对临时网络安全性的前线安全研究区具有强烈的入侵检测。在入侵检测技术中,异常检测是有利的,因为它不需要存储和定期更新已知攻击的配置文件。此外,入侵检测不限于存储的攻击配置文件,这允许检测新的攻击。因此,异常检测更适合临时网络的动态和有限的资源性质。对于适当构造的网络模型,攻击图已在组织网络攻击组合中的效用。在本文中,我们建议在Ad Hoc网络中使用攻击图。作为一个例子,我们给出了我们为蠕虫攻击创建的攻击图。对于Ad hoc网络中的异常预测,相关性和检测,我们建议使用两种依赖于攻击图的方法。第一种方法基于攻击图邻接矩阵,有助于预测单个或多个步进攻击以及入侵警报相关性的分类。第二种方法使用攻击图距离来关联入侵事件和构建攻击方案。我们的方法更适合于临时网络的协作和动态性质,特别是在应用水平。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号