Network counter-attack strategy by topology map analysis

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In general, network attack should be prohibited and information security technology should contribute to improve the trust of network communication. Almost network communication is based on IP packet which is standardized by the international organization. So, network attack does not work without following the standardized manner. Therefore network attack also leaks information concerning adversaries by their IP packets. In this paper, we propose a new network attack strategy which counter-attacks adversary. We collect and analyze IP packets from adversary, and derive network topology map of adversary. The characteristics of topology map can be analyzed by the eigenvalue of topology matrix. We observe the changes of characteristics of topology map by the influence of attack scenario simulations. Then we choose the most effective or suitable network counter-attack strategy. In this paper, we propose two kinds of attack scenarios and three types of tactics. And we show example attacks using actual data of adversary who are observed by our dark-net monitoring.

Cite

CITATION STYLE

APA

Tanaka, H. (2016). Network counter-attack strategy by topology map analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10063 LNCS, pp. 243–262). Springer Verlag. https://doi.org/10.1007/978-3-319-49806-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free