可视化网络攻击对大规模数据和知识系统中基于web的交易的影响

IF 0.6 4区 工程技术 Q4 Engineering Nuclear Engineering International Pub Date : 2019-09-30 DOI:10.18034/ei.v7i2.578
Mani Manavalan, Nur Mohammad Ali Chisty
{"title":"可视化网络攻击对大规模数据和知识系统中基于web的交易的影响","authors":"Mani Manavalan, Nur Mohammad Ali Chisty","doi":"10.18034/ei.v7i2.578","DOIUrl":null,"url":null,"abstract":"Manual approaches rely on the abilities and knowledge of individual human administrators to detect, analyze, and interpret attacks. Intrusion Detection Systems (IDS) are systems that can automatically detect and warn the appropriate persons when an attack occurs. Despite the fact that individual attacks can be useful, they are frequently insufficient for understanding the entire attacking process, as well as the attackers' talents and objectives. The attacking stage is usually merely a component of a larger infiltration process, during which attackers gather information and set up the proper conditions before launching an attack, after which they clear log records in order to conceal their footprints and disappear. In today's assault scenarios, the pre-definition of cause-and-effect links between events is required, which is a tough and time-consuming task that takes considerable effort. Our technique for creating attack scenarios is based on the linking nature of web pages, and it does not require the pre-definition of cause and effect links, as demonstrated in previous work. Constructed situations are displayed in spatial and temporal coordinate systems to make viewing and analyzing them more convenient. In addition, we develop a prototype implementation of the concept, which we utilize to test a number of assault scenario scenarios.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Visualizing the Impact of Cyberattacks on Web-Based Transactions on Large-Scale Data and Knowledge-Based Systems\",\"authors\":\"Mani Manavalan, Nur Mohammad Ali Chisty\",\"doi\":\"10.18034/ei.v7i2.578\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Manual approaches rely on the abilities and knowledge of individual human administrators to detect, analyze, and interpret attacks. Intrusion Detection Systems (IDS) are systems that can automatically detect and warn the appropriate persons when an attack occurs. Despite the fact that individual attacks can be useful, they are frequently insufficient for understanding the entire attacking process, as well as the attackers' talents and objectives. The attacking stage is usually merely a component of a larger infiltration process, during which attackers gather information and set up the proper conditions before launching an attack, after which they clear log records in order to conceal their footprints and disappear. In today's assault scenarios, the pre-definition of cause-and-effect links between events is required, which is a tough and time-consuming task that takes considerable effort. Our technique for creating attack scenarios is based on the linking nature of web pages, and it does not require the pre-definition of cause and effect links, as demonstrated in previous work. Constructed situations are displayed in spatial and temporal coordinate systems to make viewing and analyzing them more convenient. In addition, we develop a prototype implementation of the concept, which we utilize to test a number of assault scenario scenarios.\",\"PeriodicalId\":49736,\"journal\":{\"name\":\"Nuclear Engineering International\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2019-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Nuclear Engineering International\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.18034/ei.v7i2.578\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Nuclear Engineering International","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.18034/ei.v7i2.578","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 7

摘要

手动方法依赖于单个管理员的能力和知识来检测、分析和解释攻击。入侵检测系统(IDS)是能够在攻击发生时自动检测并警告适当人员的系统。尽管个别攻击可能是有用的,但它们通常不足以理解整个攻击过程,以及攻击者的才能和目标。攻击阶段通常只是一个更大的渗透过程的一个组成部分,攻击者在发动攻击之前收集信息,设置适当的条件,然后清除日志记录,隐藏自己的足迹,消失。在当今的攻击场景中,需要预先定义事件之间的因果关系,这是一项艰巨且耗时的任务,需要付出相当大的努力。我们创建攻击场景的技术是基于网页的链接性质,它不需要预先定义因果链接,正如之前的工作所展示的那样。构建的情景以时空坐标系显示,便于查看和分析。此外,我们开发了一个概念的原型实现,我们利用它来测试一些攻击场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Visualizing the Impact of Cyberattacks on Web-Based Transactions on Large-Scale Data and Knowledge-Based Systems
Manual approaches rely on the abilities and knowledge of individual human administrators to detect, analyze, and interpret attacks. Intrusion Detection Systems (IDS) are systems that can automatically detect and warn the appropriate persons when an attack occurs. Despite the fact that individual attacks can be useful, they are frequently insufficient for understanding the entire attacking process, as well as the attackers' talents and objectives. The attacking stage is usually merely a component of a larger infiltration process, during which attackers gather information and set up the proper conditions before launching an attack, after which they clear log records in order to conceal their footprints and disappear. In today's assault scenarios, the pre-definition of cause-and-effect links between events is required, which is a tough and time-consuming task that takes considerable effort. Our technique for creating attack scenarios is based on the linking nature of web pages, and it does not require the pre-definition of cause and effect links, as demonstrated in previous work. Constructed situations are displayed in spatial and temporal coordinate systems to make viewing and analyzing them more convenient. In addition, we develop a prototype implementation of the concept, which we utilize to test a number of assault scenario scenarios.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Nuclear Engineering International
Nuclear Engineering International 工程技术-核科学技术
自引率
0.00%
发文量
0
审稿时长
6-12 weeks
期刊介绍: Information not localized
期刊最新文献
A Review of Cybersecurity and Biometric Authentication in Cloud Network Network Security Framework, Techniques, and Design for Hybrid Cloud Wave Structures for Nonlinear Schrodinger Types Fractional Partial Differential Equations Arise in Physical Sciences Significant of Gradient Boosting Algorithm in Data Management System Handwritten Bangla Numerical Digit Recognition Using Fine Regulated Deep Neural Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1