Graph-Based Real-Time Security Threats Awareness and Analysis in Enterprise LAN
Huiying Lv (),
Yuan Zhang (),
Ruimei Wang () and
Jie Wang ()
Additional contact information
Huiying Lv: Capital Normal University
Yuan Zhang: Capital Normal University
Ruimei Wang: Capital Normal University
Jie Wang: Capital Normal University
A chapter in LISS 2013, 2015, pp 1299-1304 from Springer
Abstract:
Abstract In order to dynamically and accurately recognize real-time network security situation in an enterprise LAN, an awareness and analysis method for network threats is proposed. The method recognizes current real-time threats and predicts subsequent threats by modeling attack scenario and simulating intrusion state transferring. The threat awareness model is constructed with Expanded Finite-State Automata, which is defined as Attack State Transition Graph and Real-Time Attack State Graph. The former visually describes all possible intruding paths and state transitions, and the latter illustrates really happening threats and real-time state transition. Then threat awareness algorithm is presented, of which various kinds of invalid threats are filtered, and current valid threats are obtained by correlating dynamic alarms with static attack scenario. Further, combining ASTG with RASG, subsequent threat and possible threat path is identified, which provides a useful evidence and guidance for intrusion response and security decision. Finally the results of experiment in a simulated network verify validity of the method.
Keywords: LAN; Threat; Graph; Real-time; State transition (search for similar items in EconPapers)
Date: 2015
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-642-40660-7_195
Ordering information: This item can be ordered from
http://www.springer.com/9783642406607
DOI: 10.1007/978-3-642-40660-7_195
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().