loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Colin Pattinson and Kemal Hajdarevic

Affiliation: Leeds Metropolitan University, United Kingdom

Keyword(s): Training network managers, denial of service attack, simulation.

Related Ontology Subjects/Areas/Topics: Communication and Software Technologies and Architectures ; Data Communication Networking ; e-Business ; Enterprise Information Systems ; Information and Systems Security ; Intrusion Detection & Prevention ; Network and Service Management ; Network Management ; Telecommunications ; Wireless Information Networks and Systems

Abstract: One of the major challenges facing the e-Business community, and the broader telecommunications network world, is the threat of electronic attack. Of the sub-categories of such attacks, the denial of service attack, in which the intruder’s objective is to prevent legitimate users from accessing some or all of an organisation’s computing resource, regularly creates headlines in the popular press. Whilst significant research effort is being expended on the development of automated tools to recognise such attacks, for many businesses (particularly the small business sector) network management (including security and intrusion detection) is the responsibility of an individual employee (the “network manager”), among whose responsibilities is the observation and monitoring of network behaviour, and who will be expected to monitor data, detect the signs of intrusion, and take action, ideally before the attack has taken effect. Traditionally, this skill has developed through a hands-on proce ss, learning “normal” behaviour, using this knowledge to detect anomalies, undertaking further investigation to determine more details of the cause. This will involve interaction with the “live” network, and the first experience of an attack will be when it actually occurs. This is counter to good training practice, in which a trainee will have had experience of “problem situations” in a controlled environment, and will have the opportunity to develop their responses, review actions and repeat the activity, so that when the situation occurs “for real”, responses are semi-automatic. This paper describes a simulation-based training tool in which student network managers experience the symptoms and effects of a denial of service attack and practice their responses in a controlled environment, with the aim of preparing them more effectively for the time they meet such an attack in reality. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.218.127.141

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Pattinson, C. and Hajdarevic, K. (2004). TRAINING NETWORK MANAGERS TO RECOGNISE INTRUSION ATTACKS. In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE; ISBN 972-8865-15-5; ISSN 2184-3236, SciTePress, pages 269-274. DOI: 10.5220/0001386202690274

@conference{icete04,
author={Colin Pattinson. and Kemal Hajdarevic.},
title={TRAINING NETWORK MANAGERS TO RECOGNISE INTRUSION ATTACKS},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE},
year={2004},
pages={269-274},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001386202690274},
isbn={972-8865-15-5},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE
TI - TRAINING NETWORK MANAGERS TO RECOGNISE INTRUSION ATTACKS
SN - 972-8865-15-5
IS - 2184-3236
AU - Pattinson, C.
AU - Hajdarevic, K.
PY - 2004
SP - 269
EP - 274
DO - 10.5220/0001386202690274
PB - SciTePress