مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

856
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks

Pages

  91-103

Abstract

 One of the most important threats of recent years in computer systems and cyber space is ambiguous cyber-attack. Obfuscation at the level of attack means change of attack, without change in behavior and change in the type of impact of attack on the victim. In this paper, a new classification method has been proposed for modeling cyber attacks, a method based on the technique of Insertion attacks. In this method, by increasing the wrong classification in attack strategies, the dependency between the warnings and precautions is separated; so, by increasing the length of the attack, network security managers cannot easily distinguish cyber-attacks. The proposed model is based on Bayesian algorithm. Tables and the assessment figures show the proper formulation of the mechanisms provided for the sequence of attacks so that the detection of obfuscation attacks is far less likely than clean attacks. By increasing the sequence of attacks, the correct classification accuracy tends to zero. The proposed method for obfuscation of the attacks due to the ability to mislead the Intrusion detection systems and to create uncertainty in the sequence of the observed attacks, has better performance than the obfuscation logic at both code and action level.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Shoushian, K., Rashidi, A. J., & DEHGHANI, M.. (2020). Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 7(4 ), 91-103. SID. https://sid.ir/paper/362759/en

    Vancouver: Copy

    Shoushian K., Rashidi A. J., DEHGHANI M.. Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2020;7(4 ):91-103. Available from: https://sid.ir/paper/362759/en

    IEEE: Copy

    K. Shoushian, A. J. Rashidi, and M. DEHGHANI, “Modeling of cyber-attacks obfuscation based on the attack analogous to the technique of insertion attacks,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 7, no. 4 , pp. 91–103, 2020, [Online]. Available: https://sid.ir/paper/362759/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button