A Novel Approach for Network Attack Classification Based on Sequential Questions
Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 2
Abstract
With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards distributed hardware and software. Lack of standard network attack taxonomy has become an indispensable dispute on developing a clear understanding about the attacks in order to have an operative protection mechanism. Present attack categorization techniques protect a specific group of threat which has either messed the entire taxonomy structure or ambiguous when one network attacks get blended with few others attacks. Hence, this raises concerns about developing a common and general purpose taxonomy. In this study, a sequential question-answer based model of categorization is proposed. In this article, an intrusion detection framework and threat grouping schema are proposed on the basis of four sequential questions (“Who”, “Where”, “How” and “What”). We have used our method for classifying traditional network attacks in order to identify initiator, source, attack style and seriousness of an attack. Another focus of the paper is to provide a preventive list of actions for network administrator as a guideline to reduce overall attack consequence. Recommended taxonomy is designed to detect common attacks rather than any particular type of attack which can have a practical effect in real life attack classification. From the analysis of the classifications obtained from few infamous attacks, it is obvious that the proposed system holds certain benefits related to the prevailing taxonomies. Future research directions have also been well acknowledged.
Authors and Affiliations
Md Mehedi Hassan Onik, Nasr Al-Zaben, Hung Phan Hoo, Chul-Soo Kim
Filling Factors of Sunspots in SODISM Images
The calculated filling factors (FFs) for a feature reflect the fraction of the solar disc covered by that feature, and the assignment of reference synthetic spectra. In this paper, the FFs, specified as a function of rad...
Cross-cultural Usability Issues in E/M-Learning
This paper gives an overview of electronic learning (E-Learning) and mobile learning (M-Learning) adoption and diffusion trends, as well as their particular traits, characteristics and issues, especially in terms of cros...
A Method of Body Parts Force Displacements Calculation of Metal-Cutting Machine Tools Using CAD and CAE Technologies
This paper describes a developed new method of body parts force displacements calculation of metal-cutting machine tools using combination of CAD and CAE technologies. It was carried out the analysis of analytical method...
Atomic Cross-chain Swaps: Development, Trajectory and Potential of Non-monetary Digital Token Swap Facilities
Since the introduction of Bitcoin in 2008, many other cryptocurrencies have been introduced and gained popularity. Lack of interoperability and scalability amongst these cryptocurrencies was - and still is - acting as a...
Object Identification Based on the Automated Extraction of Spatial Semantics from Web3D Scenes
We present a web-based methodology for the extraction of semantic information and object identification in poorly annotated Web3D scenes. Our approach is based on a set of rules that mimic human spatial cognition, backed...