Attack Intention Recognition: A Review

Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has...

Penerangan Penuh

Disimpan dalam:
Butiran Bibliografi
Pengarang-pengarang Utama: Ahmed, Abdulghani Ali, Noorul Ahlami, Kamarul Zaman
Format: Artikel
Diterbitkan: IJNS 2017
Subjek-subjek:
Capaian Atas Talian:http://dx.doi.org/10.6633/IJNS.201703.19(2).09
http://dx.doi.org/10.6633/IJNS.201703.19(2).09
http://umpir.ump.edu.my/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf
http://umpir.ump.edu.my/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf
Penanda-penanda: Tambah Penanda
Tiada Penanda, Jadilah orang pertama menanda rekod ini!
Penerangan
Ringkasan:Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has only helped increase network attacks and hide their malicious intent. This paper analyzes attack types and classifies them according to their intent. A causal network approach is used to recognize attackers’ plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system.