Abstract | ||
---|---|---|
This work presents a preliminary study of modeling obfuscation techniques for network attack action sequences. The aim is to develop a systematic analytical methodology that shows how intentional obfuscation or unintentional noise may affect the modeling and classification of attack sequences. Discussions on different types of obfuscation techniques will be given, followed by a formal formulation to represent the effect of obfuscation within attack sequences. Preliminary simulation results are presented to demonstrate the impact of attack sequences with and without obfuscated attack actions. |
Year | Venue | Keywords |
---|---|---|
2013 | IEEE Conference on Communications and Network Security | computer network security |
Field | DocType | ISSN |
Data mining,Computer science,Computer security,Network security,Obfuscation,Network attack | Conference | 2474-025X |
Citations | PageRank | References |
1 | 0.37 | 4 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Haitao Du | 1 | 55 | 6.88 |
Shanchieh Jay Yang | 2 | 131 | 23.11 |