Title: Network Attack Strategy by Topological Analysis

Year of Publication: Sep - 2015
Page Numbers: 9-20
Authors: Kengo Komoriya , Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa
Conference Name: The Second International Conference on Information Security and Digital Forensics (ISDF2015)
- Malaysia


In general, Network attack should be prohibited and information security technology should contribute to the improvement for trust of network communication. Network communication is based on IP packets which are standardized by international organization. Therefore, Network attack does not function without following the standardized manner. Hence, Network attack also leaks adversaries’ information in their IP packets. In this paper, we propose a new Network attack strategy which counter-attacks adversary. We collect and analyze IP packets from adversary, and derive network topology of adversary. The characteristics of topology can be analyzed by the eigenvalue of topology matrix. We observe the influence by which the attack to topology gives it to changes of characteristic, and choose most suitable network attack strategy. In this paper, we propose two kinds of attack scenarios and three types of tactics. And we show an example attack using actual data of adversary.