面向网络取证调查的网络攻击分类:文献综述

Muhamad Maulana, Ahmad Luthfi, Dwi Kurnia Wibowo
{"title":"面向网络取证调查的网络攻击分类:文献综述","authors":"Muhamad Maulana, Ahmad Luthfi, Dwi Kurnia Wibowo","doi":"10.29207/resti.v7i5.5153","DOIUrl":null,"url":null,"abstract":"The computer network plays an important role in supporting various jobs and other activities in the cyber world. Various kinds of crimes have often occurred on computer networks. It is very demanding to build a computer network architecture that is safe from attacks to protect the data transacted. If there has been an attack on the computer network, of course, further investigation must be carried out to identify the attacker and the motive for the attack. An additional need is to evaluate the security of the network. This article reports a systematic review of the literature aiming to map the classification of attacks on computer networks and map future research. Based on the exploration, 30 key studies were selected that reveal the mapping of attack classifications on computer networks. The results of the literature review show that attacks on computer networks vary widely. Based on the results of the literature review conducted, it produces a roadmap for future research, which is to classify attacks on computer networks using a machine learning approach. The use of machine learning serves to help classify and investigate the needs for attacks on computer networks. The SVM method in this case was chosen based on previous research that was widely used for data-based classification.","PeriodicalId":435683,"journal":{"name":"Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Attacks Classification for Network Forensics Investigation: Literature Reviews\",\"authors\":\"Muhamad Maulana, Ahmad Luthfi, Dwi Kurnia Wibowo\",\"doi\":\"10.29207/resti.v7i5.5153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The computer network plays an important role in supporting various jobs and other activities in the cyber world. Various kinds of crimes have often occurred on computer networks. It is very demanding to build a computer network architecture that is safe from attacks to protect the data transacted. If there has been an attack on the computer network, of course, further investigation must be carried out to identify the attacker and the motive for the attack. An additional need is to evaluate the security of the network. This article reports a systematic review of the literature aiming to map the classification of attacks on computer networks and map future research. Based on the exploration, 30 key studies were selected that reveal the mapping of attack classifications on computer networks. The results of the literature review show that attacks on computer networks vary widely. Based on the results of the literature review conducted, it produces a roadmap for future research, which is to classify attacks on computer networks using a machine learning approach. The use of machine learning serves to help classify and investigate the needs for attacks on computer networks. The SVM method in this case was chosen based on previous research that was widely used for data-based classification.\",\"PeriodicalId\":435683,\"journal\":{\"name\":\"Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.29207/resti.v7i5.5153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29207/resti.v7i5.5153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

计算机网络在支持网络世界中的各种工作和其他活动方面发挥着重要作用。各种各样的犯罪经常发生在计算机网络上。建立一个安全的计算机网络体系结构来保护所处理的数据是非常重要的。如果计算机网络受到了攻击,当然,必须进行进一步的调查,以确定攻击者和攻击动机。另一个需要是评估网络的安全性。本文对文献进行了系统的综述,旨在绘制计算机网络攻击的分类图和绘制未来的研究图。在此基础上,选取了30项重点研究,揭示了计算机网络上攻击分类的映射关系。文献综述的结果表明,对计算机网络的攻击变化很大。根据所进行的文献综述的结果,它为未来的研究制定了路线图,即使用机器学习方法对计算机网络的攻击进行分类。机器学习的使用有助于对计算机网络攻击的需求进行分类和调查。本案例中的SVM方法是在前人研究的基础上选择的,该方法在基于数据的分类中得到了广泛的应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Network Attacks Classification for Network Forensics Investigation: Literature Reviews
The computer network plays an important role in supporting various jobs and other activities in the cyber world. Various kinds of crimes have often occurred on computer networks. It is very demanding to build a computer network architecture that is safe from attacks to protect the data transacted. If there has been an attack on the computer network, of course, further investigation must be carried out to identify the attacker and the motive for the attack. An additional need is to evaluate the security of the network. This article reports a systematic review of the literature aiming to map the classification of attacks on computer networks and map future research. Based on the exploration, 30 key studies were selected that reveal the mapping of attack classifications on computer networks. The results of the literature review show that attacks on computer networks vary widely. Based on the results of the literature review conducted, it produces a roadmap for future research, which is to classify attacks on computer networks using a machine learning approach. The use of machine learning serves to help classify and investigate the needs for attacks on computer networks. The SVM method in this case was chosen based on previous research that was widely used for data-based classification.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信