谷歌浏览器插件
订阅小程序
在清言上使用

A study on Automated Cyberattacks Detection and Visualization

Fahd Alhaidari, Rawan Mushref Tammas, Dana Saeed Alghamdi, Reem Aied Alrashedi, Nora Adnan Althani, Sara Mohammad Alsaidan, Malak Khaled AlFosail,Rachid Zagrouba,Hussain Alattas

2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)(2022)

引用 0|浏览6
暂无评分
摘要
With technology evolving, cyberattacks are increasing massively. Therefore, companies and organizations are obliged to implement high-security measures to prevent, mitigate, and respond to such attacks. If a company faces a cyberattack, it should pass through the post-incident forensics analysis phase. This phase is a significant part of the investigation process since it provides valuable information on how the attack was conducted and where the vulnerability was, allowing the security team to patch it and learn how to defend against future attacks. For that reason, this paper aims to discuss a passive analysis of network traffic and review the current network traffic analysis tools and techniques, summarize, analyze, and compare them based on pre-defined criteria to find the literature gap to address it. The gap found after the analysis is that no tool suffices for all purposes of network traffic passive analysis, in terms of both detecting the presence of attacks as well as to visualizing the traffic flow.
更多
查看译文
关键词
network analysis,traffic visualization,attack detection,DoS attack,ARP spoofing attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要