Attack Intention Recognition: A Review
Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English English |
Published: |
IJNS
2017
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/14396/ http://umpir.ump.edu.my/id/eprint/14396/ http://umpir.ump.edu.my/id/eprint/14396/ http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf |
id |
ump-14396 |
---|---|
recordtype |
eprints |
spelling |
ump-143962017-11-21T06:05:36Z http://umpir.ump.edu.my/id/eprint/14396/ Attack Intention Recognition: A Review Ahmed, Abdulghani Ali Noorul Ahlami, Kamarul Zaman QA76 Computer software Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has only helped increase network attacks and hide their malicious intent. This paper analyzes attack types and classifies them according to their intent. A causal network approach is used to recognize attackers’ plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system. IJNS 2017 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf Ahmed, Abdulghani Ali and Noorul Ahlami, Kamarul Zaman (2017) Attack Intention Recognition: A Review. International Journal of Network Security, 19 (2). pp. 244-250. ISSN 1816-353X (Print); 1816-3548 (Online) http://dx.doi.org/10.6633/IJNS.201703.19(2).09 DOI: 10.6633/IJNS.201703.19(2).09 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Malaysia Pahang |
building |
UMP Institutional Repository |
collection |
Online Access |
language |
English English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Ahmed, Abdulghani Ali Noorul Ahlami, Kamarul Zaman Attack Intention Recognition: A Review |
description |
Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection
systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has only helped increase network attacks and hide their malicious intent. This paper analyzes attack types and classifies them according to their intent. A causal network approach is used to recognize attackers’ plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system. |
format |
Article |
author |
Ahmed, Abdulghani Ali Noorul Ahlami, Kamarul Zaman |
author_facet |
Ahmed, Abdulghani Ali Noorul Ahlami, Kamarul Zaman |
author_sort |
Ahmed, Abdulghani Ali |
title |
Attack Intention Recognition: A Review |
title_short |
Attack Intention Recognition: A Review |
title_full |
Attack Intention Recognition: A Review |
title_fullStr |
Attack Intention Recognition: A Review |
title_full_unstemmed |
Attack Intention Recognition: A Review |
title_sort |
attack intention recognition: a review |
publisher |
IJNS |
publishDate |
2017 |
url |
http://umpir.ump.edu.my/id/eprint/14396/ http://umpir.ump.edu.my/id/eprint/14396/ http://umpir.ump.edu.my/id/eprint/14396/ http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf |
first_indexed |
2023-09-18T22:18:06Z |
last_indexed |
2023-09-18T22:18:06Z |
_version_ |
1777415473266163712 |