Paper
22 September 2003 Identifying and tracking attacks on networks: C3I displays and related technologies
Gavin W. Manes, J. Dawkins, Sujeet Shenoi, John C. Hale
Author Affiliations +
Abstract
Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
© (2003) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Gavin W. Manes, J. Dawkins, Sujeet Shenoi, and John C. Hale "Identifying and tracking attacks on networks: C3I displays and related technologies", Proc. SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, (22 September 2003); https://doi.org/10.1117/12.500850
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Networks

Network architectures

Network security

Visualization

Data modeling

Systems modeling

Visual process modeling

RELATED CONTENT

Reactive data visualizations
Proceedings of SPIE (February 08 2015)
A tricolor monitoring system of net loan based on Weibo...
Proceedings of SPIE (August 09 2018)
Webs on the Web (WOW) 3D visualization of ecological...
Proceedings of SPIE (June 04 2004)
Firewall systems: the next generation
Proceedings of SPIE (January 03 1996)

Back to Top