2019
DOI: 10.51983/ajcst-2019.8.s1.1953
|View full text |Cite
|
Sign up to set email alerts
|

Attack Impact Discovery and Recovery with Dynamic Bayesian Networks

Abstract: The network attacks are discovered using the Intrusion Detection Systems (IDS). Anomaly, signature and compound attack detection schemes are employed to fetch malicious data traffic activities. The attack impact analysis operations are carried out to discover the malicious objects in the network. The system objects are contaminated with process injection or hijacking. The attack ramification model discovers the contaminated objects. The dependency networks are built to model the information flow over the objec… Show more

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles