D. Parfenov, L. Zabrodina, A. Zhigalov, V. Torchin, Anton Parfenov
{"title":"基于网络节点状态分析的网络攻击识别方法研究","authors":"D. Parfenov, L. Zabrodina, A. Zhigalov, V. Torchin, Anton Parfenov","doi":"10.1109/EnT47717.2019.9030558","DOIUrl":null,"url":null,"abstract":"This study is aimed at building a model of attack detection based on the analysis of chains of states of network nodes. The proposed model allows us to determine the speed and acceleration of state change for a particular type of network attack at a given time. On the basis of the revealed patterns of changes in the States of network nodes, the study of chains of network events to identify the type of attacks. As part of the experimental study, the effectiveness of the developed model of attack recognition in the network of telecommunications service providers was evaluated, which shows a sufficiently high accuracy of determining the class of suspicious activity.","PeriodicalId":288550,"journal":{"name":"2019 International Conference on Engineering and Telecommunication (EnT)","volume":"508 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Investigation of the Method for Identifying Cyberattacks Based on Analysis of the State of Network Nodes\",\"authors\":\"D. Parfenov, L. Zabrodina, A. Zhigalov, V. Torchin, Anton Parfenov\",\"doi\":\"10.1109/EnT47717.2019.9030558\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study is aimed at building a model of attack detection based on the analysis of chains of states of network nodes. The proposed model allows us to determine the speed and acceleration of state change for a particular type of network attack at a given time. On the basis of the revealed patterns of changes in the States of network nodes, the study of chains of network events to identify the type of attacks. As part of the experimental study, the effectiveness of the developed model of attack recognition in the network of telecommunications service providers was evaluated, which shows a sufficiently high accuracy of determining the class of suspicious activity.\",\"PeriodicalId\":288550,\"journal\":{\"name\":\"2019 International Conference on Engineering and Telecommunication (EnT)\",\"volume\":\"508 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Engineering and Telecommunication (EnT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EnT47717.2019.9030558\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Engineering and Telecommunication (EnT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EnT47717.2019.9030558","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigation of the Method for Identifying Cyberattacks Based on Analysis of the State of Network Nodes
This study is aimed at building a model of attack detection based on the analysis of chains of states of network nodes. The proposed model allows us to determine the speed and acceleration of state change for a particular type of network attack at a given time. On the basis of the revealed patterns of changes in the States of network nodes, the study of chains of network events to identify the type of attacks. As part of the experimental study, the effectiveness of the developed model of attack recognition in the network of telecommunications service providers was evaluated, which shows a sufficiently high accuracy of determining the class of suspicious activity.