Trend analysis of Network Attacks: Visualization and Prediction in Complex Multi-Stage Network
Keywords:
Network vulnerability, attack graph, adjacency matrix, clustering technique, cyber defenseAbstract
There are many protocols for network security, however none of them can be considered secure. Additionally, it is difficult and time-consuming to train end users. It is true that developing into a skilled cybersecurity specialist requires a lot of time. Through several incremental penetrations that have the potential to attack crucial systems, many hackers and criminals attempt to exploit the flaws. The standard tools that are available for this purpose are insufficient to handle the situation as needed. With continually changing networks, risks are always there and are very likely to result in serious incidents. A methodology to visualize and forecast cyberattacks in intricate, multilayered networks has been put forth in this scientific effort. The calculation will be in accordance with the networks within the particular domain's cyber software vulnerabilities. There is a summary of all the network security options accessible as well as potential vulnerabilities in the system. The matrix is used to show the attacker's vulnerability-based multi-graph method. Additionally, a proposed attack graph algorithm identifies all the weak points in the network, allowing for the placement of sensors at the required locations to harden the network. Multi-Stage Cyber Attack Vulnerabilities are evaluated using the described attack graph
Downloads
References
Mishra. S., Sharma. S.K. and Alowaidi. M.A. (2021). Multilayer self-defense system to protect enterprise cloud,” CMC-Computer Materials & Continua, vol. 66, no. 1, pp. 71-85.
Gupta. R., Tanwar. S., Tyagi. S., and Kumar. N. (2020). Machine learning models for secure data analytics: a taxonomy and threat model,” Computer Communications, vol. 153, pp. 406-440.
Mishra. S., Sharma. S.K., and Alowaidi. M.A. (2020). Analysis of security issues of cloud-base. web applications,”. Journal of Ambient Intelligence and Humanized Computing, pp.1-12.
Mishra. S., and Alowaidi. M.A., Sharma. S.K. (2021). Impact of security standards and policies on the credibility of e-government,”. Journal of Ambient Intelligence and Humanized Computing, pp.1-12.
Sarker. I.H., Abushark. Y.B., Alsolami. F. and Khan. A.I. (2020). Intrudtree: a machine learning based cyber security intrusion detection model,” Symmetry, vol.12, no.5, pp.1-15.
Mishra. S. (2020). SDN-based secure architecture for IoT,” International Journal of Knowledge and Systems Science (IJKSS), vol.11, no,4, pp. 1-16.
Aldweesh. A., Derhab. A., and Emam. A.Z. (2020). Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Systems, vol.189, pp.1-19.
Husak. M., Komarkova. J., Harb. E. B., and Celeda. P. (2018). Survey of attack projection, prediction, and forecasting in cyber security," IEEE Communications Surveys & Tutorials, vol.21, no.1, pp.640-660.
Liu. J., Lu. H., Wang. M. Chen J., and Zhang. Y. (2020). Macro perspective research on transportation safety: an empirical analysis of network characteristics and vulnerability,” Sustainability, vol.12,no.15, pp.1-17.
Ghadi. M., Sali. A., Szalay. Z., and Torok. A. (2020). A new methodology for analyzing vehicle network topologies for critical hacking,” Journal of Ambient Intelligence and Humanized Computing, pp.1-12.
Liu. S., Yu. Y., Hu. W., Peng. Y. and Yang. X. (2020). Intelligent vulnerability analysis for connectivity and critical-area integrity in IoV.” IEEE Access, vol.8, pp.114239-114248.
Lallie. H.S., Debattista. K. and Bal. J., (2020). “A review of attack graph and attack tree visual syntax in cyber security,” Computer Science Review, vol.35, pp.1-41.
Pirani. M., Taylor. J.A. and Sinopoli. B. (2021). “Strategic sensor placement on graphs,” Systems & Control Letters, vol.148, pp.1-8.
Cinque. M., Della. C. and Pecchia. A. (2020). “Contextual filtering and prioritization of computer application logs for security situational awareness,” Future Generation Computer Systems, vol.111, pp.668-680.
Stergiopoulos. G., Dedousi. P. and Gritzalis. D. (2021). “Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0,” International Journal of Information Security, pp.1-23.
Pourhabibi. T., Ong. K.L., Kam. B.H. and Boo. Y.L. (2020). “Fraud detection: a systematic literature review of graph-based anomaly detection approaches,” Decision Support Systems, vol.133, pp.1-15.
Ibrahim. M., Qays. A., Elhafiz. R., Alsheikh. A. and Alquq. O. (2020). “Attack graph implementation and visualization for cyber physical systems,”Processes vol.8, no. 1 ,pp.12.
Sansavini. F. and Parigi. V. (2020). “Continuous variables graph states shaped as complex networks: optimization and manipulation,” Entropy, vol.22, no.1, pp.1-14.
Hu. Z., Feiping. N., Chang. W., Shuzheng. H., Wang. R., Xuelong. L. et al.,(2020). “Multi-view spectral clustering via sparse graph learning,” Neurocomputing, vol.384, pp.1-10.
Liu. L., Luo. S., Guo. F. and Tan. S. (2020). “Multi-point shortest path planning based on an improved discrete bat algorithm,” Applied Soft Computing, vol. 95, pp.1-10.
Chen. L., Yue. D., Dou. C., Chen. J. and Cheng .Z. (2020). “Study on attack paths of cyber-attack in cyber-physical power systems, IET Generation, Transmission & Distribution, vol.14, no.12, pp.2352-2360.