مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,130
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Modeling of Cyber-Attacks Obfuscation, Based on Alteration Technique of Attack

Pages

  67-77

Abstract

 With the increasing rate of cyber-attacks, creating security for cyberspace has become more important and crucial. Therefore computers, computer networks and all current systems connected to the Internet are always at risk of cyber-attacks. In this paper, a novel technique based on alteration technique of attack is proposed by providing a new classification in the methods of obfuscation. In this method, by replacing the attacks that have similar characteristics in the attack strategies the attacker causes an increase in wrong classification and thus reduces the dependence between attack steps. Therefore, by increasing the length of the attack, network security managers cannot easily distinguish cyber-attacks. The proposed model was assessed based on the Bayesian algorithm. The results of the research and implementation of the model indicate that the accuracy of classification (in terms of log) by intrusion detection systems for the best case of clean attacks in the sequel of attack, is-0. 02 and for obfuscation attacks at the action level is-0. 19. For obfuscate attacks with the alternative technique it becomes-3 and for the insertion technique it decreases to-6. 74. In the proposed model, as in the obfuscation-based insertion technique, the corresponding attack method has been used. Due to the difference in the type of ambiguity model, different results are obtained, and the combination of these two obfuscating techniques in cyber-attacks can bring better results to the attacker in deceiving the intrusion detection systems and creating uncertainties in the sequence of observed attacks.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Shoushian, K., Rashidi, A. J., & DEHGHANI, M.. (2020). Modeling of Cyber-Attacks Obfuscation, Based on Alteration Technique of Attack. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 8(1 ), 67-77. SID. https://sid.ir/paper/358250/en

    Vancouver: Copy

    Shoushian K., Rashidi A. J., DEHGHANI M.. Modeling of Cyber-Attacks Obfuscation, Based on Alteration Technique of Attack. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2020;8(1 ):67-77. Available from: https://sid.ir/paper/358250/en

    IEEE: Copy

    K. Shoushian, A. J. Rashidi, and M. DEHGHANI, “Modeling of Cyber-Attacks Obfuscation, Based on Alteration Technique of Attack,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 8, no. 1 , pp. 67–77, 2020, [Online]. Available: https://sid.ir/paper/358250/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top