In general, network attack should be prohibited and information security technology should contribute to improve the trust of network communication. Almost network communication is based on IP packet which is standardized by the international organization. So, network attack does not work without following the standardized manner. Therefore network attack also leaks information concerning adversaries by their IP packets. In this paper, we propose a new network attack strategy which counter-attacks adversary. We collect and analyze IP packets from adversary, and derive network topology map of adversary. The characteristics of topology map can be analyzed by the eigenvalue of topology matrix. We observe the changes of characteristics of topology map by the influence of attack scenario simulations. Then we choose the most effective or suitable network counter-attack strategy. In this paper, we propose two kinds of attack scenarios and three types of tactics. And we show example attacks using actual data of adversary who are observed by our dark-net monitoring.
CITATION STYLE
Tanaka, H. (2016). Network counter-attack strategy by topology map analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10063 LNCS, pp. 243–262). Springer Verlag. https://doi.org/10.1007/978-3-319-49806-5_13
Mendeley helps you to discover research relevant for your work.