z-logo
open-access-imgOpen Access
Cyber Attacks Visualization and Prediction in Complex Multi-Stage Network
Author(s) -
Jassir Adel Altheyabi,
AUTHOR_ID
Publication year - 2022
Publication title -
˜al-œmağallaẗ al-akādīmiyyaẗ li-l-abḥāṯ wa-al-našr al-ʿilmī
Language(s) - English
Resource type - Journals
ISSN - 2706-6495
DOI - 10.52132/ajrsp.e.2022.33.3
Subject(s) - exploit , hacker , computer science , computer security , process (computing) , domain (mathematical analysis) , compromise , network security , vulnerability (computing) , mathematical analysis , social science , mathematics , sociology , operating system
In network security, various protocols exist, but these cannot be said to be secure. Moreover, is not easy to train the end-users, and this process is time-consuming as well. It can be said this way, that it takes much time for an individual to become a good cybersecurity professional. Many hackers and illegal agents try to take advantage of the vulnerabilities through various incremental penetrations that can compromise the critical systems. The conventional tools available for this purpose are not enough to handle things as desired. Risks are always present, and with dynamically evolving networks, they are very likely to lead to serious incidents. This research work has proposed a model to visualize and predict cyber-attacks in complex, multilayered networks. The calculation will correspond to the cyber software vulnerabilities in the networks within the specific domain. All the available network security conditions and the possible places where an attacker can exploit the system are summarized.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here