Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices connected by 2050. This tremendous growth dramatically increases the attack surface of both private and public networks. These attacks often influence the behaviour of the system, leading to the detection of the attack. In this manuscript we model the path of an attack through the network by graphs. The model developed aims to better integer attackers intentions. Using the data produced by 5 honeypots, we apply our model. The preliminary results show that the approach is useful to rapidly detect anomalies in the experiment dataset
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...
The rapid growth of the Internet has triggered an explosion in the number of applications that lever...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices conn...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
With the rising number of cyber threats in communication networks, there is a demand for attack anal...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
YesCyber attack is a sensitive issue in the world of Internet security. Governments and business or...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
Includes bibliographical referencesWhile assessing security on single devices can be performed using...
Computer networks have increasingly been the focus of cyber attack, such as botnets, which have a va...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
Security systems cannot be efficiently designed without both a good preliminary understanding of mal...
Anomaly detection for cyber security defence has received much attention in recent years, providing ...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...
The rapid growth of the Internet has triggered an explosion in the number of applications that lever...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices conn...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
With the rising number of cyber threats in communication networks, there is a demand for attack anal...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
YesCyber attack is a sensitive issue in the world of Internet security. Governments and business or...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
Includes bibliographical referencesWhile assessing security on single devices can be performed using...
Computer networks have increasingly been the focus of cyber attack, such as botnets, which have a va...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
Security systems cannot be efficiently designed without both a good preliminary understanding of mal...
Anomaly detection for cyber security defence has received much attention in recent years, providing ...
Malware is a major threat to security and privacy of network users. A huge variety of malware typica...
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...
The rapid growth of the Internet has triggered an explosion in the number of applications that lever...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...