Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Presentations and other scholarship

2006

Cyber attacks

Articles 1 - 1 of 1

Full-Text Articles in Entire DC Network

Tandi: Threat Assessment Of Network Data And Information, Jared Holsopple, Shanchieh Jay Yang, Moises Sudit Apr 2006

Tandi: Threat Assessment Of Network Data And Information, Jared Holsopple, Shanchieh Jay Yang, Moises Sudit

Presentations and other scholarship

Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with …