Topology Awareness on Network Damage Assessment and Control Strategies Generation

Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hui He, Hongli Zhang, Lihua Yin, Yongtan Liu
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 175
container_issue
container_start_page 169
container_title
container_volume
creator Hui He
Hongli Zhang
Lihua Yin
Yongtan Liu
description Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.
doi_str_mv 10.1109/ICICSE.2009.50
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5521608</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5521608</ieee_id><sourcerecordid>5521608</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1192ec2a33b51a753ad04e5b2eaac85806f6a7412cf5182e1bd4c7d49ff1901f3</originalsourceid><addsrcrecordid>eNpVjMFqhDAURVNKoWXqtptu8gPavJioWYqdToWhpYz74alPsVUzmMAwf1-h3czdXA6Hexl7AhEBCPNSFmVx2EZSCBNpccMCk2agpFJJqnVye8XK3LPAuW-xRulYpckD-6rsyY62v_D8jAvN5By3M_8gf7bLD3_FCXviuXOrmGj2HOeWF3b2ix35wS_oqR_I8d06XWGw8yO763B0FPz3hlVv26p4D_efu7LI9-FghA8BjKRGYhzXGjDVMbZCka4lITaZzkTSJZgqkE2nIZMEdauatFWm68AI6OINe_67HYjoeFqGCZfLUWsJicjiX9yAUP0</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Topology Awareness on Network Damage Assessment and Control Strategies Generation</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Hui He ; Hongli Zhang ; Lihua Yin ; Yongtan Liu</creator><creatorcontrib>Hui He ; Hongli Zhang ; Lihua Yin ; Yongtan Liu</creatorcontrib><description>Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.</description><identifier>ISBN: 9781424467549</identifier><identifier>ISBN: 1424467543</identifier><identifier>EISBN: 9781424467556</identifier><identifier>EISBN: 9780769540276</identifier><identifier>EISBN: 0769540279</identifier><identifier>EISBN: 1424467551</identifier><identifier>DOI: 10.1109/ICICSE.2009.50</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system control ; Computer networks ; Computer science ; Computer worms ; Control strategy ; Electronic mail ; Emergency response ; Entropy ; Intrusion detection ; Large-scale systems ; Network security ; Network topology ; Process control</subject><ispartof>2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, p.169-175</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5521608$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5521608$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hui He</creatorcontrib><creatorcontrib>Hongli Zhang</creatorcontrib><creatorcontrib>Lihua Yin</creatorcontrib><creatorcontrib>Yongtan Liu</creatorcontrib><title>Topology Awareness on Network Damage Assessment and Control Strategies Generation</title><title>2009 Fourth International Conference on Internet Computing for Science and Engineering</title><addtitle>ICICSE</addtitle><description>Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.</description><subject>Communication system control</subject><subject>Computer networks</subject><subject>Computer science</subject><subject>Computer worms</subject><subject>Control strategy</subject><subject>Electronic mail</subject><subject>Emergency response</subject><subject>Entropy</subject><subject>Intrusion detection</subject><subject>Large-scale systems</subject><subject>Network security</subject><subject>Network topology</subject><subject>Process control</subject><isbn>9781424467549</isbn><isbn>1424467543</isbn><isbn>9781424467556</isbn><isbn>9780769540276</isbn><isbn>0769540279</isbn><isbn>1424467551</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjMFqhDAURVNKoWXqtptu8gPavJioWYqdToWhpYz74alPsVUzmMAwf1-h3czdXA6Hexl7AhEBCPNSFmVx2EZSCBNpccMCk2agpFJJqnVye8XK3LPAuW-xRulYpckD-6rsyY62v_D8jAvN5By3M_8gf7bLD3_FCXviuXOrmGj2HOeWF3b2ix35wS_oqR_I8d06XWGw8yO763B0FPz3hlVv26p4D_efu7LI9-FghA8BjKRGYhzXGjDVMbZCka4lITaZzkTSJZgqkE2nIZMEdauatFWm68AI6OINe_67HYjoeFqGCZfLUWsJicjiX9yAUP0</recordid><startdate>200912</startdate><enddate>200912</enddate><creator>Hui He</creator><creator>Hongli Zhang</creator><creator>Lihua Yin</creator><creator>Yongtan Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200912</creationdate><title>Topology Awareness on Network Damage Assessment and Control Strategies Generation</title><author>Hui He ; Hongli Zhang ; Lihua Yin ; Yongtan Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1192ec2a33b51a753ad04e5b2eaac85806f6a7412cf5182e1bd4c7d49ff1901f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Communication system control</topic><topic>Computer networks</topic><topic>Computer science</topic><topic>Computer worms</topic><topic>Control strategy</topic><topic>Electronic mail</topic><topic>Emergency response</topic><topic>Entropy</topic><topic>Intrusion detection</topic><topic>Large-scale systems</topic><topic>Network security</topic><topic>Network topology</topic><topic>Process control</topic><toplevel>online_resources</toplevel><creatorcontrib>Hui He</creatorcontrib><creatorcontrib>Hongli Zhang</creatorcontrib><creatorcontrib>Lihua Yin</creatorcontrib><creatorcontrib>Yongtan Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hui He</au><au>Hongli Zhang</au><au>Lihua Yin</au><au>Yongtan Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Topology Awareness on Network Damage Assessment and Control Strategies Generation</atitle><btitle>2009 Fourth International Conference on Internet Computing for Science and Engineering</btitle><stitle>ICICSE</stitle><date>2009-12</date><risdate>2009</risdate><spage>169</spage><epage>175</epage><pages>169-175</pages><isbn>9781424467549</isbn><isbn>1424467543</isbn><eisbn>9781424467556</eisbn><eisbn>9780769540276</eisbn><eisbn>0769540279</eisbn><eisbn>1424467551</eisbn><abstract>Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focus on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.</abstract><pub>IEEE</pub><doi>10.1109/ICICSE.2009.50</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424467549
ispartof 2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009, p.169-175
issn
language eng
recordid cdi_ieee_primary_5521608
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Communication system control
Computer networks
Computer science
Computer worms
Control strategy
Electronic mail
Emergency response
Entropy
Intrusion detection
Large-scale systems
Network security
Network topology
Process control
title Topology Awareness on Network Damage Assessment and Control Strategies Generation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T01%3A02%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Topology%20Awareness%20on%20Network%20Damage%20Assessment%20and%20Control%20Strategies%20Generation&rft.btitle=2009%20Fourth%20International%20Conference%20on%20Internet%20Computing%20for%20Science%20and%20Engineering&rft.au=Hui%20He&rft.date=2009-12&rft.spage=169&rft.epage=175&rft.pages=169-175&rft.isbn=9781424467549&rft.isbn_list=1424467543&rft_id=info:doi/10.1109/ICICSE.2009.50&rft_dat=%3Cieee_6IE%3E5521608%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424467556&rft.eisbn_list=9780769540276&rft.eisbn_list=0769540279&rft.eisbn_list=1424467551&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5521608&rfr_iscdi=true