Attack Intention Recognition: A Review

Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has...

Full description

Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Noorul Ahlami, Kamarul Zaman
Format: Article
Language:English
English
Published: IJNS 2017
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf
http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf
id ump-14396
recordtype eprints
spelling ump-143962017-11-21T06:05:36Z http://umpir.ump.edu.my/id/eprint/14396/ Attack Intention Recognition: A Review Ahmed, Abdulghani Ali Noorul Ahlami, Kamarul Zaman QA76 Computer software Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has only helped increase network attacks and hide their malicious intent. This paper analyzes attack types and classifies them according to their intent. A causal network approach is used to recognize attackers’ plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system. IJNS 2017 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf Ahmed, Abdulghani Ali and Noorul Ahlami, Kamarul Zaman (2017) Attack Intention Recognition: A Review. International Journal of Network Security, 19 (2). pp. 244-250. ISSN 1816-353X (Print); 1816-3548 (Online) http://dx.doi.org/10.6633/IJNS.201703.19(2).09 DOI: 10.6633/IJNS.201703.19(2).09
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
English
topic QA76 Computer software
spellingShingle QA76 Computer software
Ahmed, Abdulghani Ali
Noorul Ahlami, Kamarul Zaman
Attack Intention Recognition: A Review
description Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has only helped increase network attacks and hide their malicious intent. This paper analyzes attack types and classifies them according to their intent. A causal network approach is used to recognize attackers’ plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system.
format Article
author Ahmed, Abdulghani Ali
Noorul Ahlami, Kamarul Zaman
author_facet Ahmed, Abdulghani Ali
Noorul Ahlami, Kamarul Zaman
author_sort Ahmed, Abdulghani Ali
title Attack Intention Recognition: A Review
title_short Attack Intention Recognition: A Review
title_full Attack Intention Recognition: A Review
title_fullStr Attack Intention Recognition: A Review
title_full_unstemmed Attack Intention Recognition: A Review
title_sort attack intention recognition: a review
publisher IJNS
publishDate 2017
url http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/
http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf
http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf
first_indexed 2023-09-18T22:18:06Z
last_indexed 2023-09-18T22:18:06Z
_version_ 1777415473266163712