DocumentCode :
547425
Title :
The automaton modeling of typical network attacks
Author :
Zhicai, Shi
Author_Institution :
Electron. & Electr. Eng. Inst., Shanghai Univ. of Eng. Sci., Shanghai, China
Volume :
1
fYear :
2011
fDate :
10-12 June 2011
Firstpage :
243
Lastpage :
246
Abstract :
Network security is one of the most important research fields among information security techniques. Most problems of network security are often caused by network attacks. In order to ensure network secure running it is very necessary to analyze and research the procedure of network attacks. In this paper, the formal method is researched and automaton theory is used to describe the procedure of network attacks. The state transform diagrams of some typical network attacks are given. Different state transform diagrams are used to describe models for various network attacks and these models can be combined flexibly so as to describe complicated attack behaviors. This formal method for describing network attacks provides an effective approach for researching the mechanism of network attacks.
Keywords :
deterministic automata; finite automata; security of data; attack behavior; automaton modeling; automaton theory; deterministic finite automata; formal method; information security; intrusion detection; network attack; network security; state transform diagram; Automata; Computational modeling; Computers; Doped fiber amplifiers; IP networks; Security; Servers; automata; information security; network attack; network intrusion;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-8727-1
Type :
conf
DOI :
10.1109/CSAE.2011.5953213
Filename :
5953213
Link To Document :
بازگشت