Stealing complex network attack detection method considering security situation awareness

PLoS One. 2024 Mar 21;19(3):e0298555. doi: 10.1371/journal.pone.0298555. eCollection 2024.

Abstract

Tracking and detection have brought great challenges to network security. Therefore, this paper proposes a monitoring method of stealthy complex network attacks considering security situation awareness. By constructing a tracking model of invisible complex network attacks, public monitoring nodes are selected for monitoring. The cost of a single monitoring node is calculated by the algorithm, and the monitoring node is determined by the monitoring node algorithm, so as to reduce the resource occupancy rate of the monitoring node and improve the monitoring accuracy. The simulation results show that this method is stable in the range of 1000 to 4000 nodes, and can effectively monitor the complex network attacks of stealing secrets.

MeSH terms

  • Algorithms
  • Awareness*
  • Computer Security
  • Computer Simulation
  • Theft*

Grants and funding

The author(s) received no specific funding for this work.