Abstract
Tracking and detection have brought great challenges to network security. Therefore, this paper proposes a monitoring method of stealthy complex network attacks considering security situation awareness. By constructing a tracking model of invisible complex network attacks, public monitoring nodes are selected for monitoring. The cost of a single monitoring node is calculated by the algorithm, and the monitoring node is determined by the monitoring node algorithm, so as to reduce the resource occupancy rate of the monitoring node and improve the monitoring accuracy. The simulation results show that this method is stable in the range of 1000 to 4000 nodes, and can effectively monitor the complex network attacks of stealing secrets.
Publisher
Public Library of Science (PLoS)
Reference21 articles.
1. M. A. Hussain, H. Jin, Z. A. Hussien, Z. A. Abduljabbar, et al. 2016. DNS Protection against Spoofing and Poisoning Attacks. 3rd International Conference on Information Science and Control Engineering (ICISCE), 441: 1308–1312.
2. M. A. Hussain, H. Jin, Z. A. Hussien, Z. A. Abduljabbar, et al. 2016. ARP Enhancement to Stateful Protocol by Registering ARP Request,. 2016 International Conference on Network and Information Systems for Computers (ICNISC), 441: 31–35.
3. M. A. A Sibahee, S. Lu, Z. A. Hussien, M. A. Hussain, et al. 2017. The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN. 2017 International Conference on Computing Intelligence and Information System (CIIS), 442: 308–312.
4. Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing;H. M Abdulridha;Security and Communication Networks,2017
5. Research on Network Attack Detection Based on Self-adaptive Immune Computing;J Y. Chen;Computer Science,2018