Research on Attack Model for Cognitive Network Based on Scientific Analysis of Network Material System

Article Preview

Abstract:

Cognitive attacks, which influence the user’s perceptions and behavior, are more serious than physical or even syntactic attacks. We construct an attack model for cognitive Network based on scientific analysis of Network material system to visualize cognitive attack. The cognitive attack model consists of two parts: attackers and netizens. We formalize each element of the model. The cognitive attack example analysis illustrates the rationality of the model.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

911-914

Citation:

Online since:

June 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M Libicki. The mesh and the Net: Speculations on armed conflict in an age of free silicon. National Defense University McNair Paper 28, 1994, http: /www. ndu. edu/ndu/inss/macnair/mcnair28/m028cont. html.

DOI: 10.21236/ada278484

Google Scholar

[2] B Schneier. Semantic Attacks: the Third Wave of Network Attacks. Crypto-gram Newsletter October 15, (2000). http: /www. schneier. com/crypto-gram-0010. html.

Google Scholar

[3] G Cybenko, A Giani, P Thompson. Cognitive hacking and the value of information. http: /www. ists. dartmouth. edu/library/86. pdf.

Google Scholar

[4] H M Guan, A M Chen. Four levels of Network countermeasure[J]. Microcomputer world, Vol. 6, No. 35(1999), pp.84-85. (in Chinese).

Google Scholar

[5] B Schneier. Attack trees[J]. Dr. Dobb's Journal of software tools, Vol. 12(1999).

Google Scholar

[6] J McDermott. Attack Net penetration testing[C]. ACM SIGSAC, Ireland, Sept, (2000), pp.15-22.

Google Scholar

[7] O Sheyner, J Haines, R Lippmann, et al. Automated generation and analysis of attack graphs[C]. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May (2002).

DOI: 10.1109/secpri.2002.1004377

Google Scholar

[8] V Mehta, C Bartzis, H Zhu, et al. Ranking Attack Graphs[J]. In Proceeding of the 9th International Symposium On Recent Advances In Intrusion Detection, Hamburg, Germany, September 2006, Springer.

Google Scholar

[9] L Lu, R S Naini, J Horton, et al. An Adversaty aware and intrusion detection aware attack model ranking scheme[C]. ACNS 2007, LNCS 4521 (2007), pp.65-86.

DOI: 10.1007/978-3-540-72738-5_5

Google Scholar