An adaptive algorithm for detecting and preventing attacks in telecommunication networks

作者: Maryna Yevdokymenko , None

DOI: 10.1109/INFOCOMMST.2016.7905373

关键词:

摘要: This article proposed method for monitoring threats preparing attacks on the telecommunications network and to prevent opportunities their implementation. The is based implementation of states in functioning components, vulnerability assessment determination facts preparation intruder (monitoring risks attacks) by finding warning function a given interval time.

参考文章(20)
Andreas Hess, Michael Jung, Günter Schäfer, Combining Multiple Intrusion Detection and Response Technologies in an Active Networking Based Architecture DFN-Arbeitstagung über Kommunikationsnetze. pp. 153- 165 ,(2003)
Fouad Wehbe, D. V. Ageyev, Parametric synthesis of enterprise infocommunication systems using a multi-layer graph model international crimean conference microwave and telecommunication technology. pp. 507- 508 ,(2013)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Zhuo Ning, Jian Gong, A Sampling Method for Intrusion Detection System asia pacific network operations and management symposium. pp. 419- 428 ,(2008) , 10.1007/978-3-540-88623-5_43
S. Rubin, S. Jha, B.P. Miller, Automatic generation and analysis of NIDS attacks annual computer security applications conference. pp. 28- 38 ,(2004) , 10.1109/CSAC.2004.9
A. A. Ignatenko, D. V. Ageyev, Structural and parametric synthesis of telecommunication systems with the usage of the multi-layer graph model international crimean conference microwave and telecommunication technology. pp. 498- 499 ,(2013)
F. Oliviero, L. Peluso, S.P. Romano, REFACING: An autonomic approach to network security based on multidimensional trustworthiness Computer Networks. ,vol. 52, pp. 2745- 2763 ,(2008) , 10.1016/J.COMNET.2008.04.022
R. Perdisci, D. Dagon, Wenke Lee, P. Fogla, M. Sharif, Misleading worm signature generators using deliberate noise injection ieee symposium on security and privacy. pp. 17- 31 ,(2006) , 10.1109/SP.2006.26
Mati Pinyathinun, Chanboon Sathitwiriyawong, Dynamic policy model for target based intrusion detection system international conference on information systems. pp. 930- 934 ,(2009) , 10.1145/1655925.1656094