Richard Brooks, Nathan Orr, John Zachary, Christopher Griffin
{"title":"网络保护的交互自动机模型","authors":"Richard Brooks, Nathan Orr, John Zachary, Christopher Griffin","doi":"10.1109/ICIF.2002.1020934","DOIUrl":null,"url":null,"abstract":"Malicious network activity is rapidly increasing. To understand and engineer countermeasures to network attacks, we have developed cellular automata models of network flow dynamics and associated attacks. We describe the theoretical development of our model and compare it to existing models of network flow based on statistical physics. Using our model, we have found empirical evidence that a link exists between the behavior of a network and its entropy. This paper discusses potential extensions of this work to entropy-based intrusion detection systems (IDS).","PeriodicalId":399150,"journal":{"name":"Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An interacting automata model for network protection\",\"authors\":\"Richard Brooks, Nathan Orr, John Zachary, Christopher Griffin\",\"doi\":\"10.1109/ICIF.2002.1020934\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malicious network activity is rapidly increasing. To understand and engineer countermeasures to network attacks, we have developed cellular automata models of network flow dynamics and associated attacks. We describe the theoretical development of our model and compare it to existing models of network flow based on statistical physics. Using our model, we have found empirical evidence that a link exists between the behavior of a network and its entropy. This paper discusses potential extensions of this work to entropy-based intrusion detection systems (IDS).\",\"PeriodicalId\":399150,\"journal\":{\"name\":\"Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIF.2002.1020934\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIF.2002.1020934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An interacting automata model for network protection
Malicious network activity is rapidly increasing. To understand and engineer countermeasures to network attacks, we have developed cellular automata models of network flow dynamics and associated attacks. We describe the theoretical development of our model and compare it to existing models of network flow based on statistical physics. Using our model, we have found empirical evidence that a link exists between the behavior of a network and its entropy. This paper discusses potential extensions of this work to entropy-based intrusion detection systems (IDS).