D. Parfenov, L. Zabrodina, A. Zhigalov, V. Torchin, Anton Parfenov
{"title":"Investigation of the Method for Identifying Cyberattacks Based on Analysis of the State of Network Nodes","authors":"D. Parfenov, L. Zabrodina, A. Zhigalov, V. Torchin, Anton Parfenov","doi":"10.1109/EnT47717.2019.9030558","DOIUrl":null,"url":null,"abstract":"This study is aimed at building a model of attack detection based on the analysis of chains of states of network nodes. The proposed model allows us to determine the speed and acceleration of state change for a particular type of network attack at a given time. On the basis of the revealed patterns of changes in the States of network nodes, the study of chains of network events to identify the type of attacks. As part of the experimental study, the effectiveness of the developed model of attack recognition in the network of telecommunications service providers was evaluated, which shows a sufficiently high accuracy of determining the class of suspicious activity.","PeriodicalId":288550,"journal":{"name":"2019 International Conference on Engineering and Telecommunication (EnT)","volume":"508 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Engineering and Telecommunication (EnT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EnT47717.2019.9030558","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This study is aimed at building a model of attack detection based on the analysis of chains of states of network nodes. The proposed model allows us to determine the speed and acceleration of state change for a particular type of network attack at a given time. On the basis of the revealed patterns of changes in the States of network nodes, the study of chains of network events to identify the type of attacks. As part of the experimental study, the effectiveness of the developed model of attack recognition in the network of telecommunications service providers was evaluated, which shows a sufficiently high accuracy of determining the class of suspicious activity.