首页> 外文会议>International Conference on Future Internet of Things and Cloud >Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network
【24h】

Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network

机译:企业网络中隐形攻击的检测,减缓和定量安全风险评估

获取原文

摘要

Given the increasing dependence of our societies on network information systems and the efforts being provided by security communities to secure their networks, a strong sense of insecurity still prevails. Therefore, there is a need for new countermeasures against these cyber-attacks which causes disruption to business processes. The evaluation approaches to detect and assess the security risk level of cyber-attacks are harder to develop due to lack of information such as scope of attack and the way it originate. This paper assess the security risk level of those attacks which are targeting to IT, business networks and critical infrastructure, and where malicious user's actions are direct threats to the targeted system but yet not visible by the targeted system. This is achieved after classifying each Google dorks (commands) as an invisible attacks according to their characteristics. In addition, a method is devised to secure any organization's network against invisible attacks by creating a rule in Snort NIDPS signature database. Furthermore, OWASP risk rating methodology is incorporated to assess the overall severity risk level of invisible attacks on the network in terms of high, medium and low. Since, this method does not provide the quantitative security risk value of enterprise network, therefore, quantitative security risk assessment of enterprise network is determined using severity risk assessment table.
机译:鉴于我们社会对网络信息系统的依赖性越来越多,安全社区提供保护其网络的努力,强烈的不安全感仍然是胜利的。因此,需要对这些网络攻击的新对策,这导致业务流程中断。检测和评估网络攻击安全风险水平的评估方法更加难以发展,因为缺乏攻击范围和它起源的方式。本文评估了针对它,业务网络和关键基础架构的攻击的安全风险水平,以及恶意用户的操作对目标系统的直接威胁,但是目标系统不可见。根据其特征在将每个Google Dorks(命令)分类为无形的攻击之后,这是实现的。此外,通过在Snort NIDPS签名数据库中创建规则,设计了一种方法,以保护任何组织的网络免受不可见攻击。此外,否则欧安风险评级方法被纳入,以评估高,中低,低,低的网络上无形攻击的总体严重程度风险水平。由于这种方法没有提供企业网络的定量安全风险价值,因此,使用严重风险评估表确定企业网络的定量安全风险评估。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号