Cyber-Attack Analysis of a School Computer Network

dc.contributor.authorAkinola, A.A
dc.contributor.authorKuye, A
dc.contributor.authorAyodeji, A
dc.date.accessioned2016-08-29T12:55:43Z
dc.date.available2016-08-29T12:55:43Z
dc.date.issued2014-07-20
dc.descriptionTo access the full text of this article, kindly contact the University Librarian- Dr. Olukemi Fadehan via the administrators: Dr. Yetunde Zaid (yzaid@unilag.edu.ng) or Dr. Christopher Okiki (cokiki@unilag.edu.ng) of the University of Lagos Library.en_US
dc.description.abstractCyber attacks on higher education institutions have been on the increase, particularly because, in contrast to targets like banks and financial institutions, college and university computer networks have historically been as open and inviting as their campuses. Such institutions are vulnerable to security breaches that may expose them to losses and other risks. There is a need to determine which paths are most vulnerable to attacks so as to implement ways of reducing the vulnerability. Sections on the school’s network system for possible cyber-attacks include the Database server, Mail server, VOIP, Library/resources and Administrative server. Other sections include the firewalls and devices that connect the Internet to the schools local area network (LAN). In this paper, the attack tree modeling techniques of quantifying cyber-attacks for a school network system is presented. Attack trees are developed by decomposing the path in the network system to where attacks are plausible. This work focuses on possible attacks by external adversary on a database server because of the sensitivity of the information on the database. The vulnerabilities on the network system were represented by nodes on the Attack Tree. Two possible attack paths were constructed for the system. One attack path represents attacks through the internet, and the other represents attacks through the wireless access points in the school vicinity. The probability of success of the event, the attack payoff and the commitment of the attacker to intrude is estimated for the leaf nodes and this is used to calculate the Return on Attack up the attack tree. A Return on Attack (R) value was then calculated for the root node. Countermeasures were then implemented and a modified network system obtained. The R values for the nodes were observed to decrease, after upgrading the network security systems with these countermeasures. The knowledge of the possible attacks allows the system administrators to provide adequate defenses against cyber attack scenarios.en_US
dc.identifier.citationAkinola, A.A, Kuye, A and Ayodeji, A (2014) Cyber-Attack Analysis of a School Computer Network.Presented at the 55th Annual Meeting of INMM, Atlanta.en_US
dc.identifier.urihttp://www.academia.edu/10769954/Cyber-Attack_Analysis_of_a_School_Computer_Network
dc.identifier.urihttp://ir.unilag.edu.ng:8080/xmlui/handle/123456789/990
dc.language.isoenen_US
dc.subjectCyber-attacken_US
dc.subjectQuantitativeen_US
dc.subjectVulnerability assessmenten_US
dc.titleCyber-Attack Analysis of a School Computer Networken_US
dc.typePresentationen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Cyber-Attack Analysis of a School Computer Network.pdf
Size:
108.35 KB
Format:
Adobe Portable Document Format
Description:
Abstract
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: