{"title":"利用罕见事件模拟评估网络渗透的可能性","authors":"Alexander Krall, M. Kuhl, Stephen Moskal, S. Yang","doi":"10.1109/SSCI.2016.7849913","DOIUrl":null,"url":null,"abstract":"Network infiltration is one of many types of cyber-based attacks that may be of interest to a cyber security analyst. Sufficient observation of particular events that may be uncommon during network infiltration requires special simulation techniques. This paper presents an application of the importance sampling method to estimate the likelihood of a successful network infiltration, given that sufficiently many network alerts have not been generated to achieve said success. The benefits of utilizing importance sampling within this context are assessed against the use of standard simulation.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Assessing the likelihood of cyber network infiltration using rare-event simulation\",\"authors\":\"Alexander Krall, M. Kuhl, Stephen Moskal, S. Yang\",\"doi\":\"10.1109/SSCI.2016.7849913\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network infiltration is one of many types of cyber-based attacks that may be of interest to a cyber security analyst. Sufficient observation of particular events that may be uncommon during network infiltration requires special simulation techniques. This paper presents an application of the importance sampling method to estimate the likelihood of a successful network infiltration, given that sufficiently many network alerts have not been generated to achieve said success. The benefits of utilizing importance sampling within this context are assessed against the use of standard simulation.\",\"PeriodicalId\":120288,\"journal\":{\"name\":\"2016 IEEE Symposium Series on Computational Intelligence (SSCI)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Symposium Series on Computational Intelligence (SSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSCI.2016.7849913\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSCI.2016.7849913","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Assessing the likelihood of cyber network infiltration using rare-event simulation
Network infiltration is one of many types of cyber-based attacks that may be of interest to a cyber security analyst. Sufficient observation of particular events that may be uncommon during network infiltration requires special simulation techniques. This paper presents an application of the importance sampling method to estimate the likelihood of a successful network infiltration, given that sufficiently many network alerts have not been generated to achieve said success. The benefits of utilizing importance sampling within this context are assessed against the use of standard simulation.