Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network

Rashid Munir, M. Mufti, I. Awan, Yim-Fun Hu, Jules Pagna Disso
{"title":"Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network","authors":"Rashid Munir, M. Mufti, I. Awan, Yim-Fun Hu, Jules Pagna Disso","doi":"10.1109/FiCloud.2015.24","DOIUrl":null,"url":null,"abstract":"Given the increasing dependence of our societies on network information systems and the efforts being provided by security communities to secure their networks, a strong sense of insecurity still prevails. Therefore, there is a need for new countermeasures against these cyber-attacks which causes disruption to business processes. The evaluation approaches to detect and assess the security risk level of cyber-attacks are harder to develop due to lack of information such as scope of attack and the way it originate. This paper assess the security risk level of those attacks which are targeting to IT, business networks and critical infrastructure, and where malicious user's actions are direct threats to the targeted system but yet not visible by the targeted system. This is achieved after classifying each Google dorks (commands) as an invisible attacks according to their characteristics. In addition, a method is devised to secure any organization's network against invisible attacks by creating a rule in Snort NIDPS signature database. Furthermore, OWASP risk rating methodology is incorporated to assess the overall severity risk level of invisible attacks on the network in terms of high, medium and low. Since, this method does not provide the quantitative security risk value of enterprise network, therefore, quantitative security risk assessment of enterprise network is determined using severity risk assessment table.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 3rd International Conference on Future Internet of Things and Cloud","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FiCloud.2015.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Given the increasing dependence of our societies on network information systems and the efforts being provided by security communities to secure their networks, a strong sense of insecurity still prevails. Therefore, there is a need for new countermeasures against these cyber-attacks which causes disruption to business processes. The evaluation approaches to detect and assess the security risk level of cyber-attacks are harder to develop due to lack of information such as scope of attack and the way it originate. This paper assess the security risk level of those attacks which are targeting to IT, business networks and critical infrastructure, and where malicious user's actions are direct threats to the targeted system but yet not visible by the targeted system. This is achieved after classifying each Google dorks (commands) as an invisible attacks according to their characteristics. In addition, a method is devised to secure any organization's network against invisible attacks by creating a rule in Snort NIDPS signature database. Furthermore, OWASP risk rating methodology is incorporated to assess the overall severity risk level of invisible attacks on the network in terms of high, medium and low. Since, this method does not provide the quantitative security risk value of enterprise network, therefore, quantitative security risk assessment of enterprise network is determined using severity risk assessment table.
企业网络隐形攻击的检测、缓解与定量安全风险评估
鉴于我们的社会对网络信息系统的依赖日益增加,以及安全社区为确保其网络安全所做的努力,强烈的不安全感仍然普遍存在。因此,有必要针对这些导致业务流程中断的网络攻击采取新的对策。由于缺乏诸如攻击范围和攻击方式等信息,难以开发检测和评估网络攻击安全风险等级的评估方法。本文评估了针对IT,业务网络和关键基础设施的攻击的安全风险级别,以及恶意用户的行为对目标系统构成直接威胁但目标系统不可见的攻击。这是在将每个Google命令根据其特征分类为隐形攻击后实现的。此外,还设计了一种方法,通过在Snort NIDPS签名数据库中创建规则来保护任何组织的网络免受不可见的攻击。此外,结合OWASP风险评级方法,对网络上隐形攻击的整体严重程度风险等级进行高、中、低评估。由于该方法没有提供企业网络的定量安全风险值,因此,采用严重性风险评估表确定企业网络的定量安全风险评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信