Detecting Intrusions Using Social Network Analysis And Bayesian Network
碩士 === 國立中山大學 === 資訊管理學系研究所 === 104 === The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target and this kind of attack need more time and skills to break in to target. Most hackers possess high knowledge an...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/5byn32 |
id |
ndltd-TW-104NSYS5396018 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104NSYS53960182019-05-15T23:01:38Z http://ndltd.ncl.edu.tw/handle/5byn32 Detecting Intrusions Using Social Network Analysis And Bayesian Network 以社交網路分析整合貝氏網路偵測網路入侵 CHIPING LAI 賴季苹 碩士 國立中山大學 資訊管理學系研究所 104 The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target and this kind of attack need more time and skills to break in to target. Most hackers possess high knowledge and rich resource about attacked target such as important department of government or companies, and the major object is steal sensitive information. Such attack type usually accompanies social engineering or zero-day exploits attacks, and the intrude period may arrive several years. In order to detect Targeted Attack, this paper proposed a conceptual framework for observing the steps of Targeted Attack and through these steps constructed a Bayesian Network detection model which combined risk assessment. Risk assessment including compute each steps of risk of Targeted Attack in order to be prepared for attack. Most of the Targeted Attack uses social engineering breaking into the target successfully. So in this paper, we collected social network and e-mail records from Intrusion Detection System (IDS) to enhance the accuracy of detection. In this paper, we detected Targeted Attack and provide the suspicious IP to be ready for future attack and reduce the chances of data theft. Chia-Mai Chen 陳嘉玫 2015 學位論文 ; thesis 61 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 資訊管理學系研究所 === 104 === The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target and this kind of attack need more time and skills to break in to target. Most hackers possess high knowledge and rich resource about attacked target such as important department of government or companies, and the major object is steal sensitive information. Such attack type usually accompanies social engineering or zero-day exploits attacks, and the intrude period may arrive several years.
In order to detect Targeted Attack, this paper proposed a conceptual framework for observing the steps of Targeted Attack and through these steps constructed a Bayesian Network detection model which combined risk assessment. Risk assessment including compute each steps of risk of Targeted Attack in order to be prepared for attack. Most of the Targeted Attack uses social engineering breaking into the target successfully. So in this paper, we collected social network and e-mail records from Intrusion Detection System (IDS) to enhance the accuracy of detection. In this paper, we detected Targeted Attack and provide the suspicious IP to be ready for future attack and reduce the chances of data theft.
|
author2 |
Chia-Mai Chen |
author_facet |
Chia-Mai Chen CHIPING LAI 賴季苹 |
author |
CHIPING LAI 賴季苹 |
spellingShingle |
CHIPING LAI 賴季苹 Detecting Intrusions Using Social Network Analysis And Bayesian Network |
author_sort |
CHIPING LAI |
title |
Detecting Intrusions Using Social Network Analysis And Bayesian Network |
title_short |
Detecting Intrusions Using Social Network Analysis And Bayesian Network |
title_full |
Detecting Intrusions Using Social Network Analysis And Bayesian Network |
title_fullStr |
Detecting Intrusions Using Social Network Analysis And Bayesian Network |
title_full_unstemmed |
Detecting Intrusions Using Social Network Analysis And Bayesian Network |
title_sort |
detecting intrusions using social network analysis and bayesian network |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/5byn32 |
work_keys_str_mv |
AT chipinglai detectingintrusionsusingsocialnetworkanalysisandbayesiannetwork AT làijìpíng detectingintrusionsusingsocialnetworkanalysisandbayesiannetwork AT chipinglai yǐshèjiāowǎnglùfēnxīzhěnghébèishìwǎnglùzhēncèwǎnglùrùqīn AT làijìpíng yǐshèjiāowǎnglùfēnxīzhěnghébèishìwǎnglùzhēncèwǎnglùrùqīn |
_version_ |
1719139752389640192 |