Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System

  • Conference paper
Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops (ISPA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4331))

Abstract

The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion in a nationwide scale, and unless effective countermeasures against such attacks are formulated in time, this could develop into a catastrophic condition. As a result, there has been vigorous search to develop a functional state-level cyber-threat early-warning system: however, the efforts have not yielded satisfying results or created plausible alternatives to date due to the insufficiency of the existing system and technical difficulties. The existing cyber-threat forecasting depends on the individual experience and ability of security manager whose decision is based on the limited data collected from ESM and TMS. Consequently, this could result in a disastrous warning failure against a variety of unknown and unpredictable attacks. It is the aim of this paper to offer a conceptual design for “Knowledge-based Real-Time Cyber-Threat Early-Warning System, and promote further researches into the subject.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hellerstein, J.L., Zhang, F., Shahabuddin, P.: A Statistical Approach to Predictive Detection. Computer Networks 35, 77–95 (2001)

    Article  Google Scholar 

  2. Zang, F., Hellerstein, J.L.: An Approach to On-line Predictive Detection. In: Proceedings of 8th International Symposium on Modeling, ASCTS (2000)

    Google Scholar 

  3. Groschwitz, N.K., Polyzos, G.C.: A Time Series Model of Long-Term NAFNET Backbone Traffic. In: Proceedings of IEEE International Conference on Communications (1994)

    Google Scholar 

  4. Shu, Y., Yu, M., Liu, J.: Wireless Traffic Modeling and Prediction using Seasonal ARIMA Models. In: Proceedings of IEEE International Conference on Communications, vol. 3 (2003)

    Google Scholar 

  5. For related news, See http://info.ahnlab.com/ahnlab/report_view.jsp?num=416

  6. Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and Early Warning for Internet Worms. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, p. 10 (2003)

    Google Scholar 

  7. Cabrera, J.B.D., Lewis, L., Qin, X., Gutierrez, C., Lee, W., Mehra, R.K.: Proactive Intrusion Detection and SNMP based Security Management. In: Proceedings of IFIP/IEEE Eighth International Symposium on Integrated Network Management, pp. 225–254 (2003)

    Google Scholar 

  8. Zhai, J., Tian, J., Du, R., Huang, J.: Network Intrusion Early Warning Model Based on D-S Evidence Theory. In: Proceedings of 2003 International Conference on Machine Learning and Cybernetics, vol. 4, pp. 1972–1977 (2003)

    Google Scholar 

  9. Li, J., Manikopoulos, C.: Early Statistical Anomaly Intrusion Detection of DOS Attacks using MIB Traffic Parameters. In: Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 53–59 (2003)

    Google Scholar 

  10. Moon, H.K., Choe, J.G., Kang, Y., Rhee, M.S.: Correlation of Network Risk and Defect through an Analysis on Cyber Threat and Vulnerability. In: KIISC 2005-1 (2005)

    Google Scholar 

  11. For related topic, See http://isc.sans.org/alldiaries.php?month=3&year=2005

  12. The “A” Government Agency’s Internal Report, February 2005 Security Response Report (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, S., Lee, D.H., Kim, K.J. (2006). A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_103

Download citation

  • DOI: https://doi.org/10.1007/11942634_103

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49860-5

  • Online ISBN: 978-3-540-49862-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics