Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Cyber-attacks visualisation and prediction in complex multi-stage network

Published: 01 January 2022 Publication History

Abstract

In network security, various protocols exist, but these cannot be said to be secure. Many hackers and illegal agents try to take advantage of the vulnerabilities through various incremental penetrations that can compromise critical systems. The conventional tools available for this purpose are not enough to handle things as desired. Risks are always present with dynamically evolving networks and are very likely to lead to serious incidents. This research work has proposed a model to visualise and predict cyber-attacks in complex, multilayered networks. All the available network security conditions and the possible places where an attacker can exploit the system are summarised. The vulnerability-based multi-graph technique for the attacker is presented. Also, an attack graph algorithm is proposed, leading to identifying all the vulnerable paths that can be used to harden the network by placing sensors at the desired locations and is used for vulnerability assessment of Multi-Stage Cyber-Attacks.

Index Terms

  1. Cyber-attacks visualisation and prediction in complex multi-stage network
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image International Journal of Computer Applications in Technology
          International Journal of Computer Applications in Technology  Volume 68, Issue 4
          2022
          111 pages
          ISSN:0952-8091
          EISSN:1741-5047
          DOI:10.1504/ijcat.2022.68.issue-4
          Issue’s Table of Contents

          Publisher

          Inderscience Publishers

          Geneva 15, Switzerland

          Publication History

          Published: 01 January 2022

          Author Tags

          1. network vulnerability
          2. attack graph
          3. adjacency matrix
          4. clustering technique
          5. cyber defence

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 0
            Total Downloads
          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 12 Sep 2024

          Other Metrics

          Citations

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media