POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis

Author(s):  
Seungoh Choi ◽  
Jeong-Han Yun ◽  
Byung-Gil Min ◽  
HyoungChun Kim
Keyword(s):  
2011 ◽  
Vol 31 (3) ◽  
pp. 784-789 ◽  
Author(s):  
Chun-zi WANG ◽  
Guang-qiu HUANG

2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Liu Xiaojian ◽  
Yuan Yuyu

We analyze the distributed network attack-defense game scenarios, and we find that attackers and defenders have different information acquisition abilities since the ownership of the target system. Correspondingly, they will have different initiative and reaction in the game. Based on that, we propose a novel dynamic game method for distributed network attack-defense game. The method takes advantage of defenders’ information superiority and attackers’ imitation behaviors and induces attackers’ reaction evolutionary process in the game to gain more defense payoffs. Experiments show that our method can achieve relatively more average defense payoffs than previous work.


Optik ◽  
2013 ◽  
Vol 124 (21) ◽  
pp. 4823-4826 ◽  
Author(s):  
Ying Liu ◽  
Wen-Xiang Gu

2021 ◽  
pp. 1-30
Author(s):  
Qingtian Zou ◽  
Anoop Singhal ◽  
Xiaoyan Sun ◽  
Peng Liu

Network attacks have become a major security concern for organizations worldwide. A category of network attacks that exploit the logic (security) flaws of a few widely-deployed authentication protocols has been commonly observed in recent years. Such logic-flaw-exploiting network attacks often do not have distinguishing signatures, and can thus easily evade the typical signature-based network intrusion detection systems. Recently, researchers have applied neural networks to detect network attacks with network logs. However, public network data sets have major drawbacks such as limited data sample variations and unbalanced data with respect to malicious and benign samples. In this paper, we present a new end-to-end approach based on protocol fuzzing to automatically generate high-quality network data, on which deep learning models can be trained for network attack detection. Our findings show that protocol fuzzing can generate data samples that cover real-world data, and deep learning models trained with fuzzed data can successfully detect the logic-flaw-exploiting network attacks.


Sign in / Sign up

Export Citation Format

Share Document