Discovering potential victims within enterprise network via link analysis method

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Potential cyber victim detection is an important research issue in the domain of network security. During an adjacent period of time, cyber victims or even potential cyber victims within an enterprise have several common patterns to the currently seized victims. Hence, this paper applies the link analysis method and proposes a hybrid method to automatically discover potential victims through their behavioral patterns hidden in the network log data. In the experiment, the proposed method has been applied to reveal potential victims from a big data (6,846,097 records of proxy logs in 1.7G and 84,693,445 records of firewall logs in 9.3G). Afterward, a ranking list of potential victims can consequently be generated for stakeholders to understand the safety condition within an enterprise. Moreover, the hierarchical connection graph of hosts can further assist managers or stakeholders to find out the potential victims more easily. As a result, the safety and prevention practice of the information security group in an enterprise would be upgraded to an active mode rather than passive mode.

Cite

CITATION STYLE

APA

Chiu, Y. T., Liu, S. T., Huang, H. C., & Hong, K. F. (2015). Discovering potential victims within enterprise network via link analysis method. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9101, pp. 326–335). Springer Verlag. https://doi.org/10.1007/978-3-319-19066-2_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free