Probabilistic Threat Propagation for Network Security

Information Forensics and Security, IEEE Transactions  (2014)

引用 40|浏览28
暂无评分
摘要
Techniques for network security analysis have historically focused on the actions of the network hosts. Outside of forensic analysis, little has been done to detect or predict malicious or infected nodes strictly based on their association with other known malicious nodes. This methodology is highly prevalent in the graph analytics world, however, and is referred to as community detection. In this paper, we present a method for detecting malicious and infected nodes on both monitored networks and the external Internet. We leverage prior community detection and graphical modeling work by propagating threat probabilities across network nodes, given an initial set of known malicious nodes. We enhance prior work by employing constraints that remove the adverse effect of cyclic propagation that is a byproduct of current methods. We demonstrate the effectiveness of probabilistic threat propagation on the tasks of detecting botnets and malicious web destinations.
更多
查看译文
关键词
Internet,computer network security,digital forensics,graph theory,probability,Botnets detection,community detection,cyclic propagation,external Internet,forensic analysis,graph analytics world,graphical modeling work,infected nodes,malicious Web destinations,malicious nodes,monitored networks,network hosts,network security analysis,probabilistic threat propagation,threat probabilities,Blacklist,Network security,botnet,community detection,graph algorithms
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要