Skip to main content
Top

2017 | OriginalPaper | Chapter

Assessment of Security Threats via Network Topology Analysis: An Initial Investigation

Authors : Marcello Trovati, Win Thomas, Quanbin Sun, Georgios Kontonatsios

Published in: Green, Pervasive, and Cloud Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Computer networks have increasingly been the focus of cyber attack, such as botnets, which have a variety of serious cybersecurity implications. As a consequence, understanding their behaviour is an important step towards the mitigation of such threat. In this paper, we propose a novel method based on network topology to assess the spreading and potential security impact of botnets. Our main motivation is to provide a toolbox to classify and analyse the security threats posed by botnets based on their dynamical and statistical behaviour. This would potentially lead to a better understanding and prediction of cybersecurity issues related to computer networks. Our initial validation shows the potential of our method providing relevant and accurate results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang, W., Daniels, T.E.: A graph based approach toward network forensics analysis. ACM Trans. Inf. Syst. Secur. 12(1), 1–33 (2008)CrossRef Wang, W., Daniels, T.E.: A graph based approach toward network forensics analysis. ACM Trans. Inf. Syst. Secur. 12(1), 1–33 (2008)CrossRef
2.
go back to reference Liao, N., Tian, S., Wang, T.: Network forensics based on fuzzy logic and expert system. Comput. Commun. 32(17), 1881–1892 (2009)CrossRef Liao, N., Tian, S., Wang, T.: Network forensics based on fuzzy logic and expert system. Comput. Commun. 32(17), 1881–1892 (2009)CrossRef
3.
go back to reference Francois, J., Wang, S., Bronzi, W., State, R., Engel, T.: BotCloud: detecting botnets using mapreduce. In: IEEE International Workshop on Information Forensics and Security, WIFS, Foz do Iguacu, Brazil, November 2011 Francois, J., Wang, S., Bronzi, W., State, R., Engel, T.: BotCloud: detecting botnets using mapreduce. In: IEEE International Workshop on Information Forensics and Security, WIFS, Foz do Iguacu, Brazil, November 2011
4.
go back to reference Abaid, Z., Sarkar, D., Ali Kaafar, M., Jha, S.: The early bird gets the Botnet: a markov chain based early warning system for Botnet attacks. In: 41st Conference on Local Computer Networks (LCN). IEEE (2016) Abaid, Z., Sarkar, D., Ali Kaafar, M., Jha, S.: The early bird gets the Botnet: a markov chain based early warning system for Botnet attacks. In: 41st Conference on Local Computer Networks (LCN). IEEE (2016)
5.
go back to reference Nagaraja, S., Mittal, P., Hong, C., Caesar, M., Borisov, N.: BotGrep: finding P2P bots with structured graph analysis. In: Proceedings of the 19th USENIX Conference on Security (2010) Nagaraja, S., Mittal, P., Hong, C., Caesar, M., Borisov, N.: BotGrep: finding P2P bots with structured graph analysis. In: Proceedings of the 19th USENIX Conference on Security (2010)
6.
go back to reference Stover, S., Dittrich, D., Hernandez, J., Dietrich, S.: Analysis of the storm, nugache trojans: P2P is here. Login 32(6), 1–8 (2007) Stover, S., Dittrich, D., Hernandez, J., Dietrich, S.: Analysis of the storm, nugache trojans: P2P is here. Login 32(6), 1–8 (2007)
7.
go back to reference Loguinov, D., Kumar, A., Rai, V., Ganesh, S.: Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience. In: Proceedings of ACM SIGCOMM, August 2003 Loguinov, D., Kumar, A., Rai, V., Ganesh, S.: Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience. In: Proceedings of ACM SIGCOMM, August 2003
8.
go back to reference Ye, N., et al.: A markov chain model of temporal behaviour for anomaly detection. In: Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, vol. 166, p. 169 (2000) Ye, N., et al.: A markov chain model of temporal behaviour for anomaly detection. In: Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, vol. 166, p. 169 (2000)
9.
go back to reference Kidmose, E.: Botnet detection using hidden markov models. Master’s thesis. Aalborg University, Denmark (2014) Kidmose, E.: Botnet detection using hidden markov models. Master’s thesis. Aalborg University, Denmark (2014)
12.
go back to reference Palmieri, F.: Percolation-based routing in the internet. J. Syst. Softw. 85(11), 2559–2573 (2012)CrossRef Palmieri, F.: Percolation-based routing in the internet. J. Syst. Softw. 85(11), 2559–2573 (2012)CrossRef
13.
go back to reference Trovati, M., Bessis, N.: An influence assessment method based on co-occurrence for topologically reduced big data sets. Soft Comput. 20(5), 2021–2030 (2015)CrossRef Trovati, M., Bessis, N.: An influence assessment method based on co-occurrence for topologically reduced big data sets. Soft Comput. 20(5), 2021–2030 (2015)CrossRef
14.
go back to reference Trovati, M.: Reduced topologically real-world networks: a big-data approach. Int. J. Distrib. Syst. Technol. (IJDST) 6(2), 45–62 (2015)CrossRef Trovati, M.: Reduced topologically real-world networks: a big-data approach. Int. J. Distrib. Syst. Technol. (IJDST) 6(2), 45–62 (2015)CrossRef
15.
go back to reference Ebel, H., Mielsch, L.I., Bornholdt, S.: Scale-free topology of e-mail networks. Phys. Rev. E 66, 035103 (2002)CrossRef Ebel, H., Mielsch, L.I., Bornholdt, S.: Scale-free topology of e-mail networks. Phys. Rev. E 66, 035103 (2002)CrossRef
Metadata
Title
Assessment of Security Threats via Network Topology Analysis: An Initial Investigation
Authors
Marcello Trovati
Win Thomas
Quanbin Sun
Georgios Kontonatsios
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-57186-7_31

Premium Partner