Entropy of a Computer Network Under Propagation of Cyber-Attacks

Entropy of a Computer Network Under Propagation of Cyber-Attacks

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-8
Year of Publication : 2023
Author : Shiju Rawther, S. Sathyalakshmi
DOI : 10.14445/22315381/IJETT-V71I8P226

How to Cite?

Shiju Rawther, S. Sathyalakshmi, "Entropy of a Computer Network Under Propagation of Cyber-Attacks," International Journal of Engineering Trends and Technology, vol. 71, no. 8, pp. 295-303, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I8P226

Abstract
With the increasing reliance on computer networks for critical infrastructure and information exchange, the security of these networks has become a paramount concern. Cyber-attacks pose a significant threat, capable of exploiting vulnerabilities within a network and causing severe damage. Understanding the dynamics of cyber-attacks and their impact on the entropy of a computer network is crucial for developing effective defense mechanisms. In this research paper, the investigation is done on the entropy of a computer network during the propagation of cyber-attacks. This research paper also proposes a novel framework for modelling the network's entropy dynamics by integrating statistical measures and graph theory. By considering network attributes such as connectivity, traffic patterns, and attack vectors, through this study, a comprehensive approach is developed to quantify the changes in entropy caused by cyber-attacks through extensive simulations on realistic network topologies, analysis of the impact of various types of cyber-attacks on network entropy. The research findings reveal that successful cyber-attacks tend to increase the entropy of a network, indicating a higher degree of disorder and unpredictability. Furthermore, the study reveals that the entropy dynamics are influenced by factors such as attack intensity, attack duration, and the network's inherent resilience. Based on research analysis, it is concluded that an entropy-based metric for assessing network vulnerability to cyber-attacks. This metric allows network administrators to quantify the potential impact of an attack and prioritize security measures accordingly. Moreover, this study has also helped in developing a real-time monitoring system that leverages the entropy metric to detect and respond to ongoing cyber-attacks promptly. This research paper contributes to the understanding of the complex relationship between cyber-attacks and network entropy. By exploring entropy as a measure of disorder in a network, This research paper provides valuable insights for designing resilient and secure computer networks. Ultimately, this work aims to enhance the overall security posture of computer networks and mitigate the risks associated with cyber-attacks. Using compartment labels Susceptible, Infectious, or Recovered, each computer network node can move between these compartments to simulate the propagation of cyber-attacks in a computer network. An attack on a computer network is predicted using a computer model. Propagation entropy can be measured to assess propagation uncertainties even when propagation choices are probabilistic. As part of this study, the compartmental epidemic model's capability has been adopted to prove the ability to predict entropy behaviour under cyber-attack.

Keywords
Cyber-Attack propagation, Kermack-McKendrick model, Propagation entropy, Network security, Attack vectors.

References
[1] Gholamreza Aghajani, and Noradin Ghadimi, “Multi-Objective Energy Management in a Micro-Grid,” Energy Reports, vol. 4, pp. 218-225, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Lanting Zeng et al., “Physics-Constrained Vulnerability Assessment of Deep Reinforcement Learning-based SCOPE,” IEEE Transactions on Power Systems, vol. 38, no. 3, pp. 2690-2704, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Zhenyong Zhang et al., “SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 581-596, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] N. Priyanka, and V. Vetriselvi, “Penetration Testing for Software Defined Networks against DOS Attack,” SSRG International Journal of Computer Science and Engineering, vol. 3, no. 8, pp. 10-13, 2016.
[CrossRef] [Publisher Link]
[5] Zhenyong Zhang et al., “Security Enhancement of Power System State Estimation with an Effective and Low-Cost Moving Target Defense,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 53, no. 5, pp. 3066–3081, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Olalekan Adeyinka, “Internet Attack Methods and Internet Security Technology,” Modeling & Simulation, pp. 77-82, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[7] G.A. Marin, “Network Security Basics,” Security & Privacy, IEEE, vol. 3, no. 6, pp. 68-72, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[8] P.W. Dowd, and J.T. McHenry, “Network Security: It's Time to Take it Seriously,” Computer, vol. 31, no. 9, pp. 24-28, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Amirreza Zarrabi, and Alireza Zarrabi, “Internet Intrusion Detection System Service in a Cloud,” International Journal of Computer Science Issues, vol. 9, no. 5, pp. 308-315, 2012.
[Google Scholar] [Publisher Link]
[10] F. L. Greitzer et al., “Predictive Modeling for Insider Threat Mitigation,” PNNL Technical ReportPNNL-SA-65204, Richland, WA: Pacific Northwest National Laboratory, 2009.
[Google Scholar]
[11] Shiju Rawther, and S. Sathyalakshmi, “Cyber Attack Link Formation in a Network,” International Journal of Engineering Trends and Technology, vol. 71, no. 5, pp. 191-196, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Roger G. Johnston, “Changing Security Paradigms,” Journal of Physical Security, vol. 4, no. 2, pp. 35-47, 2010.
[Google Scholar] [Publisher Link]
[13] M. Dacier, Y. Deswarte, and M. Kaâniche, “Models and Tools for Quantitative Assessment of Operational Security,” Information Systems Security, Chapman & Hall, Ltd. London, pp. 177-186, 1996.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Davide Balzarotti, Mattia Monga, and Sabrina, “Assessing the Risk of Using Vulnerable Components,” Quality of Protection: Security Measurements and Metrics, Springer Science Business Media, LLC, pp. 65-77, 2006.
[Google Scholar] [Publisher Link]
[15] Elizabeth LeMay et al., “Model-based Security Metrics using ADversary VIew Security Evaluation (ADVISE),” Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems, Aachen, Germany, pp. 191-200, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Romualdo Pastor-Satorras et al., “Epidemic Processes in Complex Networks,” Reviews of Modern Physics, vol. 87, no. 3, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Lu-Xing Yang, Xiaofan Yang, and Yuan Yan Tang, “A Bi-Virus Competing Spreading Model with Generic Infection Rates,” IEEE Transactions on Network Science and Engineering, vol. 5, no. 1, pp. 2-13, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[18] William Ogilvy Kermack, and A. G. McKendrick, “A Contribution to the Mathematical Theory of Epidemics,” Proceedings of the Royal Society A, vol. 115, no. 772, pp. 700–721, 1927.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Moslem Dehghani et al., “Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack,” IEEE Access, vol. 9, pp. 16488-16507, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Nguyen Huy Binh, and Le Trung Kien, “Counteraction Against Digital Data Leak: Open Source Software for Intrusion Detection and Prevention,” International Journal of Engineering Trends and Technology, vol. 69, no. 3, pp. 17-22, 2021.
[Google Scholar] [Publisher Link]
[21] Ke Liu et al., “Detection and Localization of Cyber Attacks on Water Treatment Systems: An Entropy-Based Approach,” Front Frontiers of Information Technology & Electronic Engineering, vol. 23, pp. 587–603, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Mohammad Irshaad Oozeer, and Simon Haykin, “Cognitive Risk Control for Mitigating Cyber-Attack in Smart Grid,” IEEE Access, vol. 7, pp. 125806-125826, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Shiju Rawther, and S. Sathyalakshmi, “Entropy Analysis of Cyber-Attack Propagation in Network,” 13th International Conference on Computing Communication and Networking Technologies, pp. 1-4, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Mina Youssef, and Caterina Scoglio, “Optimal Network-Based Intervention in the Presence of Undetectable Viruses,” IEEE Communications Letters, vol. 18, no. 8, pp. 1347-1350, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[25] John C Lang et al., “Analytic Models for Sir Disease Spread on Random Spatial Networks,” Journal of Complex Networks, vol. 6, no. 6, pp. 948–970, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Varanasi Usha Bala, Akhil Karrothu, and B. Sanat Kumar, “Network Packet Capturing and Incidence Response Planning to Avoid Ransomware,” SSRG International Journal of Computer Science and Engineering, vol. 5, no. 5, pp. 1-5, 2018.
[CrossRef] [Publisher Link]
[27] H. Li, Q. Zhou, and Q. Dong, “An Entropy-based Approach for Detecting Botnet Attacks in Software-Defined Networking,” Computers & Security, vol. 107, 2021.
[28] M. Mohsin, A. Ullah, and S. Jan, “Towards Assessing Network Security Using Information Entropy Analysis,” Computers, Materials & Continua, vol. 68, no.1, pp. 851-867, 2021.
[29] Q. Song, Z. Zhang, and Y. Sun, “A Novel Approach for Intrusion Detection Based on Network Traffic Entropy Analysis,” Future Internet, vol. 14, no. 1, 2022.
[30] W. Li, and X. Zhang, “Entropy Analysis of Dynamic Network Topology based on Attack Strategy,” Wireless Personal Communications, pp. 1-14, 2022.
[31] I. Lakshmi, “Security Analysis in Internet of Things Using Ddos Mechanisms,” SSRG International Journal of Mobile Computing and Application, vol. 6, no. 1, pp. 19-24, 2019.
[CrossRef] [Publisher Link]
[32] Y. Peng, S. Jiang, and H. Liu, “Research on Network Security Situation Awareness Model Based on Network Traffic Entropy Analysis,” Security and Communication Networks, 2022.
[33] Alex Mathew, “Cyber-security: Identity Deception Detection on Social Media,” International Journal of Engineering Trends and Technology, vol. 67, no. 9, pp. 55-57, 2019.
[CrossRef] [Publisher Link]
[34] Y. Qiao, R. Shi, and X. Chen, “Entropy-Based Dynamic Network Security Assessment Under Cyber-Attacks,” Journal of Network and Computer Applications, vol. 197, 2023.
[35] Zhenyong Zhang et al., “A Double-Benefit Moving Target Defense Against Cyber–Physical Attacks in Smart Grid,” IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17912-17925, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Animesh Kumar, Sandip Dutta, and Prashant Pranav, “A Comparative Study of DDoS Attack in Cloud Computing Environment,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 7, pp. 87-96, 2023.
[CrossRef] [Publisher Link]
[37] Konstantinos Xynos et al., “Penetration Testing and Vulnerability Assessments: A Professional Approach,” Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, pp. 23-24, 2010.
[Google Scholar] [Publisher Link]
[38] Richa Kunal Sharma, and Nalini Kant Joshi, “Security and Privacy Problems in Cloud Computing,” International Journal of Computer and Organization Trends, vol. 9, no. 4 pp. 30-39, 2019.
[CrossRef] [Publisher Link]
[39] Ghaith Husari et al., "Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence," IEEE International Conference on Intelligence and Security Informatics, pp. 1-6, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[40] S. Li, C. Chen, and X. Chen, “Entropy Analysis of Network Traffic for Detecting Stealthy Covert Channels,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2754-2769, 2021.
[41] B. Luo, M. Li, and T. Zhang, “Entropy-based Network Anomaly Detection Algorithm using Feature Selection,” Journal of Information Security and Applications, vol. 65, 2022.