• DocumentCode
    547425
  • Title

    The automaton modeling of typical network attacks

  • Author

    Zhicai, Shi

  • Author_Institution
    Electron. & Electr. Eng. Inst., Shanghai Univ. of Eng. Sci., Shanghai, China
  • Volume
    1
  • fYear
    2011
  • fDate
    10-12 June 2011
  • Firstpage
    243
  • Lastpage
    246
  • Abstract
    Network security is one of the most important research fields among information security techniques. Most problems of network security are often caused by network attacks. In order to ensure network secure running it is very necessary to analyze and research the procedure of network attacks. In this paper, the formal method is researched and automaton theory is used to describe the procedure of network attacks. The state transform diagrams of some typical network attacks are given. Different state transform diagrams are used to describe models for various network attacks and these models can be combined flexibly so as to describe complicated attack behaviors. This formal method for describing network attacks provides an effective approach for researching the mechanism of network attacks.
  • Keywords
    deterministic automata; finite automata; security of data; attack behavior; automaton modeling; automaton theory; deterministic finite automata; formal method; information security; intrusion detection; network attack; network security; state transform diagram; Automata; Computational modeling; Computers; Doped fiber amplifiers; IP networks; Security; Servers; automata; information security; network attack; network intrusion;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on
  • Conference_Location
    Shanghai
  • Print_ISBN
    978-1-4244-8727-1
  • Type

    conf

  • DOI
    10.1109/CSAE.2011.5953213
  • Filename
    5953213