Mathematical modeling of cyber attacks: a learning module to enhance undergraduate security curricula

作者: R. Goonatilake , Richard Stockton , J. Herath , S. Herath , A. Herath

DOI:

关键词:

摘要: We have been experimenting with methods for improving undergraduate curricula and research experiences as well the security courses Computer Science Information Systems students. Recent surges in attacks intrusions reflect vulnerabilities computer networks emerge of sophisticated new are always associated determining evolving risks preventing them. Innovative tools can help attack defenses, prevent propagations, detect respond to such attacks. Mathematical or statistical modeling is an important concept introduce students they assess vulnerability under a variety conditions that predetermine extent damages system and, thereby, predict possible losses. This paper describes learning module developed understand basic mathematical unscrupulous

参考文章(9)
Sebastian G. Elbaum, John C. Munson, Intrusion Detection Through Dynamic Software Measurement ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 41- 50 ,(1999)
Angelos D. Keromytis, Krysta Svore, Salvatore Stolfo, Katherine Heller, One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses Workshop on Data Mining for Computer Security (DMSEC), Melbourne, FL, November 19, 2003. pp. 2- 9 ,(2003) , 10.7916/D84B39Q0
T.M. Chen, J.-M. Robert, Worm epidemics in high-speed networks IEEE Computer. ,vol. 37, pp. 48- 53 ,(2004) , 10.1109/MC.2004.36
Krzysztof Siekierski, Comparison and Evaluation of Three Methods of Estimation of the Johnson Sb Distribution Biometrical Journal. ,vol. 34, pp. 879- 895 ,(1992) , 10.1002/BIMJ.4710340714
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the Slammer worm ieee symposium on security and privacy. ,vol. 1, pp. 33- 39 ,(2003) , 10.1109/MSECP.2003.1219056
Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia, A behavioral approach to worm detection workshop on rapid malcode. pp. 43- 53 ,(2004) , 10.1145/1029618.1029625
Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms international conference on computer communications. ,vol. 3, pp. 1890- 1900 ,(2003) , 10.1109/INFCOM.2003.1209211
Niels Provos, Joe McClain, Ke Wang, Search worms Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06. pp. 1- 8 ,(2006) , 10.1145/1179542.1179544