Cyber Attack Link Formation in a Network

Cyber Attack Link Formation in a Network

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-5
Year of Publication : 2023
Author : Shiju Rawther, S. Sathyalakshmi
DOI : 10.14445/22315381/IJETT-V71I5P220

How to Cite?

Shiju Rawther, S. Sathyalakshmi, "Cyber Attack Link Formation in a Network," International Journal of Engineering Trends and Technology, vol. 71, no. 5, pp. 191-196, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I5P220

Abstract
The threat of cyber-attacks has become a major concern for organizations of all sizes. The linkage between different components is an important factor in detecting and mitigating cyber-attacks. An investigation of the link formation between cyber-attacks and a network is presented in this research article. This study analyzes the behaviour of attackers and the evolution of attack campaigns within a network and proposes a method for tracing the links between different components in an attack. Cyber-attacks are analyzed based on their characteristics, and the nature of them is revealed. The study results indicate that attackers often use multiple entry points and different attack methods to get into a target network. It has been observed that attackers tend to use infrastructure and techniques across campaigns, providing evidence of the existence of networks of attackers. Creating a link between the attack node and other nodes propagates a cyber-attack in a network. At equilibrium, cyber-attacks propagate through a centre-sponsored start network even though the choice of forming a link is probabilistic. A cyber-attack in a network is analyzed using probabilistic link formation in this paper for the formation of a centre-sponsored start network. This study will help organizations improve their cyber defences by improving their understanding of how cyber-attacks from their links.

Keywords
Cyber-attack, Network, Payoff, Equilibrium, Star network, Attack-link formation.

References
[1] Gholamreza Aghajani, and Noradin Ghadimi, “Multi-objective Energy Management in a Micro-Grid,” Energy Reports, vol. 4, pp. 218-225, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Hossein Akhavan-Hejazi, and Hamed Mohsenian-Rad, “Power Systems Big Data Analytics: An Assessment of Paradigm Shift Barriers and Prospects,” Energy Reports, vol. 4, pp. 91-100, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Olalekan Adeyinka, “Internet Attack Methods and Internet Security Technology,” Second Asia International Conference on Modeling & Simulation, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[4] G.A. Marin, “Network Security Basics,” IEEE Security & Privacy, vol. 3, no. 6, pp. 68-72, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[5] P.W. Dowd, and J.T. McHenry, “Network Security: It's Time to Take It Seriously,” Computer, vol. 31, no. 9, pp. 24-28, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Amirreza Zarrabi, and Alireza Zarrabi, “Internet Intrusion Detection System Service in a Cloud,” International Journal of Computer Science Issues, vol. 9, no. 5, pp. 308-315, 2012.
[Google Scholar] [Publisher Link]
[7] Frank L. Greitzer et al., “Predictive Modeling for Insider Threat Mitigation,” PNNL Technical ReportPNNL-SA-65204, Richland, WA: Pacific Northwest National Laboratory, 2009.
[Google Scholar]
[8] Konstantinos Xynos et al., “Penetration Testing and Vulnerability Assessments: A Professional Approach,” International Cyber Resilience Conference, Edith Cowan University, 2010.
[Google Scholar] [Publisher Link]
[9] Roger G. Johnston, “Changing Security Paradigms,” Journal of Physical Security, vol. 4, no. 2, pp. 35-47, 2010.
[Google Scholar] [Publisher Link]
[10] M. Dacier, Y. Deswarte, and M. Kaâniche, “Models and Tools for Quantitative Assessment of Operational Security,” Information systems security, pp. 177-186, 1996.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Davide Balzarotti, Mattia Monga, and Sabrina Sicari, “Assessing the Risk of Using Vulnerable Components,” Quality of Protection: Advances in Information Security, pp. 65-77, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Elizabeth LeMay et al., “Model-based Security Metrics using ADversary VIew Security Evaluation (ADVISE),” 8th International Conference on Quantitative Evaluation of SysTems, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Romualdo Pastor-Satorras et al., “Epidemic Processes in Complex Networks,” Reviews of Modern Physics, vol. 87, no. 3, p. 925, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Lu-Xing Yang, Xiaofan Yang, and Yuan Yan Tang, “A Bi-virus Competing Spreading Model with Generic Infection Rates,” IEEE Transactions on Network Science and Engineering, vol. 5, no. 1, pp. 2-13, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Lu-Xing Yang, Xiaofan Yang, and Yingbo Wu, “The Impact of Patch Forwarding on the Prevalence of Computer Virus: A Theoretical Assessment Approach,” Applied Mathematical Modelling, vol. 43, pp. 110- 125, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Varanasi Usha Bala, Akhil Karrothu, and B. Sanat Kumar, “Network Packet Capturing and Incidence Response Planning to Avoid Ransomware,” SSRG International Journal of Computer Science and Engineering, vol. 5, no. 5, pp. 1-5, 2018.
[CrossRef] [Publisher Link]
[17] Venkatesh Bala, and Sanjeev Goyal, “A Noncooperative Model of Network Formation,” Econometrica-Journal of the Econometric Society, vol. 68, no. 5, pp. 1181-1229, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Mina Youssef, and Caterina Scoglio, “Optimal Network-Based Intervention in the Presence of Undetectable Viruses,” IEEE Communications Letters, vol. 18, no. 8, pp. 1347–1350, 2014.
[CrossRef] [Publisher Link]
[19] John C. Lang et al., “Analytic Models for SIR Disease Spread on Random Spatial Networks,” Journal of Complex Networks, vol. 6, no. 6, pp. 948–970, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Adel Rajab et al., “Cryptography Based Techniques of Encryption for Security of Data in Cloud Computing Paradigm,” International Journal of Engineering Trends and Technology, vol. 69, no. 10, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] William Ogilvy Kermack, and A.G. McKendrick, “A Contribution to the Mathematical Theory of Epidemics,” Proceedings of the Royal Society A, vol. 115, no. 772, 1927.
[CrossRef] [Google Scholar] [Publisher Link]