Detecting Intrusions Using Social Network Analysis And Bayesian Network

碩士 === 國立中山大學 === 資訊管理學系研究所 === 104 === The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target and this kind of attack need more time and skills to break in to target. Most hackers possess high knowledge an...

Full description

Bibliographic Details
Main Authors: CHIPING LAI, 賴季苹
Other Authors: Chia-Mai Chen
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/5byn32
id ndltd-TW-104NSYS5396018
record_format oai_dc
spelling ndltd-TW-104NSYS53960182019-05-15T23:01:38Z http://ndltd.ncl.edu.tw/handle/5byn32 Detecting Intrusions Using Social Network Analysis And Bayesian Network 以社交網路分析整合貝氏網路偵測網路入侵 CHIPING LAI 賴季苹 碩士 國立中山大學 資訊管理學系研究所 104 The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target and this kind of attack need more time and skills to break in to target. Most hackers possess high knowledge and rich resource about attacked target such as important department of government or companies, and the major object is steal sensitive information. Such attack type usually accompanies social engineering or zero-day exploits attacks, and the intrude period may arrive several years. In order to detect Targeted Attack, this paper proposed a conceptual framework for observing the steps of Targeted Attack and through these steps constructed a Bayesian Network detection model which combined risk assessment. Risk assessment including compute each steps of risk of Targeted Attack in order to be prepared for attack. Most of the Targeted Attack uses social engineering breaking into the target successfully. So in this paper, we collected social network and e-mail records from Intrusion Detection System (IDS) to enhance the accuracy of detection. In this paper, we detected Targeted Attack and provide the suspicious IP to be ready for future attack and reduce the chances of data theft. Chia-Mai Chen 陳嘉玫 2015 學位論文 ; thesis 61 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中山大學 === 資訊管理學系研究所 === 104 === The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target and this kind of attack need more time and skills to break in to target. Most hackers possess high knowledge and rich resource about attacked target such as important department of government or companies, and the major object is steal sensitive information. Such attack type usually accompanies social engineering or zero-day exploits attacks, and the intrude period may arrive several years. In order to detect Targeted Attack, this paper proposed a conceptual framework for observing the steps of Targeted Attack and through these steps constructed a Bayesian Network detection model which combined risk assessment. Risk assessment including compute each steps of risk of Targeted Attack in order to be prepared for attack. Most of the Targeted Attack uses social engineering breaking into the target successfully. So in this paper, we collected social network and e-mail records from Intrusion Detection System (IDS) to enhance the accuracy of detection. In this paper, we detected Targeted Attack and provide the suspicious IP to be ready for future attack and reduce the chances of data theft.
author2 Chia-Mai Chen
author_facet Chia-Mai Chen
CHIPING LAI
賴季苹
author CHIPING LAI
賴季苹
spellingShingle CHIPING LAI
賴季苹
Detecting Intrusions Using Social Network Analysis And Bayesian Network
author_sort CHIPING LAI
title Detecting Intrusions Using Social Network Analysis And Bayesian Network
title_short Detecting Intrusions Using Social Network Analysis And Bayesian Network
title_full Detecting Intrusions Using Social Network Analysis And Bayesian Network
title_fullStr Detecting Intrusions Using Social Network Analysis And Bayesian Network
title_full_unstemmed Detecting Intrusions Using Social Network Analysis And Bayesian Network
title_sort detecting intrusions using social network analysis and bayesian network
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/5byn32
work_keys_str_mv AT chipinglai detectingintrusionsusingsocialnetworkanalysisandbayesiannetwork
AT làijìpíng detectingintrusionsusingsocialnetworkanalysisandbayesiannetwork
AT chipinglai yǐshèjiāowǎnglùfēnxīzhěnghébèishìwǎnglùzhēncèwǎnglùrùqīn
AT làijìpíng yǐshèjiāowǎnglùfēnxīzhěnghébèishìwǎnglùzhēncèwǎnglùrùqīn
_version_ 1719139752389640192