Cyberattack Detection & Mitigation: A Goal-Oriented and Pattern-Based Approach

dc.contributor.advisorChung, Lawrence
dc.creatorMoon, Sangwoo
dc.date.accessioned2017-06-29T20:09:32Z
dc.date.available2017-06-29T20:09:32Z
dc.date.created2017-05
dc.date.issued2017-05
dc.date.submittedMay 2017
dc.date.updated2017-06-29T20:09:32Z
dc.description.abstractConcerns for computer-related security seem real and are increasingly becoming important just about everywhere. In particular, cyberattack — not necessarily attack through a physical means — has been drawing serious attention from the media, government, academia, etc. However, detecting some suspicious behavior of computer-related systems as a phenomenon of a cyberattack has been challenging. Detection helps but should be followed by some actions towards rectifying any undesirable behavior. A complete set of actions that can absolutely eliminate all the undesirable behaviors seems extremely difficult, if not impossible. In this thesis, we propose a goal-oriented and pattern-based approach to detecting and mitigating cyber attacks. Using a pattern-based approach, knowledge and experience about similar cyber attacks are categorized into different classes of patterns, which essentially consist of a set of conditions for determining if a suspicious incident belongs to a particular cyber attack pattern class and a set of actions for mitigating the cyber attack incident. Using a goal-oriented approach, together with case-based reasoning, options are explored for detecting and mitigating cyber attacks, tradeoffs among the options analyzed, and selection are made. In this thesis, one application is studied for illustrating, as well as for demonstrating the potential benefits of, our approach. The application has to do with cyber attacks from North Korea to South Korea. We feel our studies show the potential benefits for our approach — for more precisely characterizing a cyber attack (more finer-grained) and taking more surgical mitigating actions.
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10735.1/5468
dc.language.isoen
dc.rightsCopyright ©2017 is held by the author. Digital access to this material is made possible by the Eugene McDermott Library. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author.
dc.subjectCyberterrorism
dc.subjectComputer security
dc.subjectComputer networks—Security measures
dc.subjectComputer networks—Monitoring
dc.titleCyberattack Detection & Mitigation: A Goal-Oriented and Pattern-Based Approach
dc.typeThesis
dc.type.materialtext
thesis.degree.departmentComputer Science
thesis.degree.grantorUniversity of Texas at Dallas
thesis.degree.levelMasters
thesis.degree.nameMSCS

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ETD-5608-7398.84.pdf
Size:
2.86 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
LICENSE.txt
Size:
1.84 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
PROQUEST_LICENSE.txt
Size:
5.84 KB
Format:
Plain Text
Description: