2014
DOI: 10.3390/e16126602
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Modeling of Cyber Attacks with Petri Nets

Abstract: The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
4
1

Relationship

3
7

Authors

Journals

citations
Cited by 42 publications
(16 citation statements)
references
References 27 publications
0
16
0
Order By: Relevance
“…Currently Anode is also a component of the anomaly detection and security event data correlation system developed in SECOR project [100]. A final implementation in SECOR has been developed in JAVA WSO2 (http://wso2.com) environment.…”
Section: Methodsmentioning
confidence: 99%
“…Currently Anode is also a component of the anomaly detection and security event data correlation system developed in SECOR project [100]. A final implementation in SECOR has been developed in JAVA WSO2 (http://wso2.com) environment.…”
Section: Methodsmentioning
confidence: 99%
“…[22] considers the possibility of application of MAR splines in ASDCA, enabling building of exact approximation of the behavior of a standard user, or of the attacking side, according to specified parameters. A large number of works is devoted to statistical analysis of the data in ASDCA [15,23], to signature models [24] and theoretical aspects of the use of Markov chains [5,6,24] and the Petri nets [25] for the systems of cyber-attacks recognition.…”
Section: Introductionmentioning
confidence: 99%
“…Signatures describe illegal patterns in network traffic and require expert knowledge about the given network threat given a priori. Such solutions do not cope with slightly modified or so-called 0-days attacks [6]. Another group of anomaly detection methods is based on entropy analysis [7], [8], [9].…”
Section: Introductionmentioning
confidence: 99%