Topology Awareness on Network Damage Assessment and Control Strategies Generation
Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control an...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 175 |
---|---|
container_issue | |
container_start_page | 169 |
container_title | |
container_volume | |
creator | Hui He Hongli Zhang Lihua Yin Yongtan Liu |
description | Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm. |
doi_str_mv | 10.1109/ICICSE.2009.50 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5521608</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5521608</ieee_id><sourcerecordid>5521608</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1192ec2a33b51a753ad04e5b2eaac85806f6a7412cf5182e1bd4c7d49ff1901f3</originalsourceid><addsrcrecordid>eNpVjMFqhDAURVNKoWXqtptu8gPavJioWYqdToWhpYz74alPsVUzmMAwf1-h3czdXA6Hexl7AhEBCPNSFmVx2EZSCBNpccMCk2agpFJJqnVye8XK3LPAuW-xRulYpckD-6rsyY62v_D8jAvN5By3M_8gf7bLD3_FCXviuXOrmGj2HOeWF3b2ix35wS_oqR_I8d06XWGw8yO763B0FPz3hlVv26p4D_efu7LI9-FghA8BjKRGYhzXGjDVMbZCka4lITaZzkTSJZgqkE2nIZMEdauatFWm68AI6OINe_67HYjoeFqGCZfLUWsJicjiX9yAUP0</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Topology Awareness on Network Damage Assessment and Control Strategies Generation</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Hui He ; Hongli Zhang ; Lihua Yin ; Yongtan Liu</creator><creatorcontrib>Hui He ; Hongli Zhang ; Lihua Yin ; Yongtan Liu</creatorcontrib><description>Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.</description><identifier>ISBN: 9781424467549</identifier><identifier>ISBN: 1424467543</identifier><identifier>EISBN: 9781424467556</identifier><identifier>EISBN: 9780769540276</identifier><identifier>EISBN: 0769540279</identifier><identifier>EISBN: 1424467551</identifier><identifier>DOI: 10.1109/ICICSE.2009.50</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system control ; Computer networks ; Computer science ; Computer worms ; Control strategy ; Electronic mail ; Emergency response ; Entropy ; Intrusion detection ; Large-scale systems ; Network security ; Network topology ; Process control</subject><ispartof>2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, p.169-175</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5521608$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5521608$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hui He</creatorcontrib><creatorcontrib>Hongli Zhang</creatorcontrib><creatorcontrib>Lihua Yin</creatorcontrib><creatorcontrib>Yongtan Liu</creatorcontrib><title>Topology Awareness on Network Damage Assessment and Control Strategies Generation</title><title>2009 Fourth International Conference on Internet Computing for Science and Engineering</title><addtitle>ICICSE</addtitle><description>Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.</description><subject>Communication system control</subject><subject>Computer networks</subject><subject>Computer science</subject><subject>Computer worms</subject><subject>Control strategy</subject><subject>Electronic mail</subject><subject>Emergency response</subject><subject>Entropy</subject><subject>Intrusion detection</subject><subject>Large-scale systems</subject><subject>Network security</subject><subject>Network topology</subject><subject>Process control</subject><isbn>9781424467549</isbn><isbn>1424467543</isbn><isbn>9781424467556</isbn><isbn>9780769540276</isbn><isbn>0769540279</isbn><isbn>1424467551</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjMFqhDAURVNKoWXqtptu8gPavJioWYqdToWhpYz74alPsVUzmMAwf1-h3czdXA6Hexl7AhEBCPNSFmVx2EZSCBNpccMCk2agpFJJqnVye8XK3LPAuW-xRulYpckD-6rsyY62v_D8jAvN5By3M_8gf7bLD3_FCXviuXOrmGj2HOeWF3b2ix35wS_oqR_I8d06XWGw8yO763B0FPz3hlVv26p4D_efu7LI9-FghA8BjKRGYhzXGjDVMbZCka4lITaZzkTSJZgqkE2nIZMEdauatFWm68AI6OINe_67HYjoeFqGCZfLUWsJicjiX9yAUP0</recordid><startdate>200912</startdate><enddate>200912</enddate><creator>Hui He</creator><creator>Hongli Zhang</creator><creator>Lihua Yin</creator><creator>Yongtan Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200912</creationdate><title>Topology Awareness on Network Damage Assessment and Control Strategies Generation</title><author>Hui He ; Hongli Zhang ; Lihua Yin ; Yongtan Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1192ec2a33b51a753ad04e5b2eaac85806f6a7412cf5182e1bd4c7d49ff1901f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Communication system control</topic><topic>Computer networks</topic><topic>Computer science</topic><topic>Computer worms</topic><topic>Control strategy</topic><topic>Electronic mail</topic><topic>Emergency response</topic><topic>Entropy</topic><topic>Intrusion detection</topic><topic>Large-scale systems</topic><topic>Network security</topic><topic>Network topology</topic><topic>Process control</topic><toplevel>online_resources</toplevel><creatorcontrib>Hui He</creatorcontrib><creatorcontrib>Hongli Zhang</creatorcontrib><creatorcontrib>Lihua Yin</creatorcontrib><creatorcontrib>Yongtan Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hui He</au><au>Hongli Zhang</au><au>Lihua Yin</au><au>Yongtan Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Topology Awareness on Network Damage Assessment and Control Strategies Generation</atitle><btitle>2009 Fourth International Conference on Internet Computing for Science and Engineering</btitle><stitle>ICICSE</stitle><date>2009-12</date><risdate>2009</risdate><spage>169</spage><epage>175</epage><pages>169-175</pages><isbn>9781424467549</isbn><isbn>1424467543</isbn><eisbn>9781424467556</eisbn><eisbn>9780769540276</eisbn><eisbn>0769540279</eisbn><eisbn>1424467551</eisbn><abstract>Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.</abstract><pub>IEEE</pub><doi>10.1109/ICICSE.2009.50</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424467549 |
ispartof | 2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, p.169-175 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5521608 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Communication system control Computer networks Computer science Computer worms Control strategy Electronic mail Emergency response Entropy Intrusion detection Large-scale systems Network security Network topology Process control |
title | Topology Awareness on Network Damage Assessment and Control Strategies Generation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T01%3A02%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Topology%20Awareness%20on%20Network%20Damage%20Assessment%20and%20Control%20Strategies%20Generation&rft.btitle=2009%20Fourth%20International%20Conference%20on%20Internet%20Computing%20for%20Science%20and%20Engineering&rft.au=Hui%20He&rft.date=2009-12&rft.spage=169&rft.epage=175&rft.pages=169-175&rft.isbn=9781424467549&rft.isbn_list=1424467543&rft_id=info:doi/10.1109/ICICSE.2009.50&rft_dat=%3Cieee_6IE%3E5521608%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424467556&rft.eisbn_list=9780769540276&rft.eisbn_list=0769540279&rft.eisbn_list=1424467551&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5521608&rfr_iscdi=true |