<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>and decision. In International Journal of Network Security</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1145/2448556.2448566</article-id>
      <title-group>
        <article-title>Network Topology Masking in Distributed Information Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roman V. Maximov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilya I. Ivanov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergei R. Sharifullin</string-name>
          <email>sharifullinsr@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Shtemenko Krasnodar Higher Military School Krasnodar</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <volume>19</volume>
      <issue>5</issue>
      <fpage>660</fpage>
      <lpage>669</lpage>
      <abstract>
        <p>-In modern computer networks, it is possible for attackers to determine information about the algorithms of the distributed information systems functioning. For this purpose, methods of active and passive network intelligence are used. Therefore, it is necessary to ensure the secure functioning of distributed information systems in public networks. In this work, we investigated the full range of threats to which networks are exposed. Then we developed a masker, efficient software for obfuscation the network topology in distributed information systems. The topology protection of distributed information systems from the abusive and malicious actions with network topology obfuscation is considered to be one of the particular tasks while implementing the concept of software-defined networks. In addition, we determined a method for selecting the best-masked topology based on the estimation of efficiency indexes. Our findings suggest a significant increase of the protection level in masked distributed information system by increasing the resource required for network intelligence to suppress nodes.</p>
      </abstract>
      <kwd-group>
        <kwd>cyber-security</kwd>
        <kwd>security threats</kwd>
        <kwd>obfuscation</kwd>
        <kwd>network intelligence</kwd>
        <kwd>software-defined networks</kwd>
        <kwd>dynamic topology</kwd>
        <kwd>network security management</kwd>
        <kwd>secure interconnection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>Software solutions for different hardware platforms appear
today to replace hardware solutions providing network
interconnection and managing of network infrastructure. This
approach reduces the cost of technical solutions and increases
the flexibility of distributed network infrastructure. However,
the technical complexity of software, amount of services and
business processes also increase, which requires the using of
the best practices and public standards [1, 2]. The transparency
and the common architecture of distributed information
systems (DIS) contradict the principles of protection and the
attacker’s counteraction. In addition, the concept of
softwaredefined networks (SDN) is being actively developed, providing
a separation of control plane and data plane [3-7]. The high
level of automation demands the appropriate security level of
information technologies being used.</p>
      <p>The core of DIS architecture is TCP/IP protocol stack that
provides the integration of communication services and high
level of convergence in all digital communication systems
components. The basis of DIS architecture is a set of the
territorially distributed subnetworks linked over public
networks (PN). The modern DIS consists of the following
objects [8]:</p>
      <p>End user devices: workstations, software, databases,
e-mail.</p>
    </sec>
    <sec id="sec-2">
      <title>Communication gateways. equipment: access points, hubs, Data channels: leased lines, virtual private networks.</title>
      <p>
        Security of end user devices is implemented using technical
measures (anti-virus protection systems, access control
systems) and organizational measures (security policies, group
policies). Communication equipment and communication
channels are the most vulnerable component of DIS because
they have access to both PN and to the internal network. The
characteristics of the modern DIS are: (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) distributed structure
interconnects remote subnetworks, (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) high-speed transmission
based on Ethernet, (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) several external links over public
networks, (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) increasing users' demands in services.
      </p>
      <p>The use of the communication channels over PN to provide
information interaction leads to the potential security threats.
Common model of information threats (Fig. 1) can be
represented as a set of remote control points connected over PN
(under the administrative control of service providers) and
attacker's equipment. An attacker is able to connect to PN in
non-controlled area between the protectable subnetworks. The
integration of DIS with PN increases the capabilities of an
attacker to discover a functional and logical structure
(topology) through monitoring with the use of well-known
methods [9-11]. As a result, the probability of destructive
actions realization on DIS increases. Define the DIS's security
threats based on analysis of the modern DIS characteristics:
 Implementation threats: Core elements of DIS often use
an unknown technological base; therefore, they contain
embedded undocumented features.</p>
      <p>Exploitation threats: the service providers (SP) define
routing and switching based on quality of service. SP
provide virtual private network (VPN) services between
remote subnets without processing at transit
nodes. However, third party SPs can be used.</p>
      <p>Additional threats: there is the possibility of destructive
actions with the use of wide arsenal of methods.</p>
      <p>
        The security problems that are successfully solved in small
networks cannot be solved in the networks of a larger size,
because of the high complexity of network designing and wide
variety of attacks. Define the characteristics of large networks:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) complicated topology, (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) low compatibility of network
devices, (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) degradation of administrative zones’ responsibility,
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) uncertainty of the source data about topology, (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) remote
subnetworks.
      </p>
      <p>
        These characteristics ensure a high vulnerability of large
networks to various types of attacks (distributed attacks, in
particular). Traditional security methods [12-18] are based on
the use of firewalls and network filters, intrusion detection
systems and security scanners, i.e. on the discovery of the
abusive and malicious actions [19-21]. VPN services allow you
to build dedicated networks based on a shared network
infrastructure and thus implement a proactive security strategy.
However, the security level provided by existing VPN
protocols is not enough because they are based on link-layer
technologies, which leads to potential security threats [22, 23]:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) VLAN hopping, (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) MAC spoofing, (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) DHCP spoofing,
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) ARP spoofing.
      </p>
      <p>The widespread use of multiprotocol label switching in
VPN implementation expands the potential threats pool:</p>
    </sec>
    <sec id="sec-3">
      <title>Traffic encryption is not used.</title>
      <p>

 Inside attacks, including IP and Ethernet threats. It is
possible to change the configuration of the routers after
unauthorized access to equipment.</p>
      <p>Attacks through management network: SP often uses
the management network to remote configuration and
monitoring of equipment, which means external
availability between control nodes and access nodes.
Therefore, if the control nodes or the network
infrastructure of SP is compromised, an attacker gains
access to customer nodes.
 Indirect attacks. Edge routers usually provide services
to several organizations. Therefore, attacks on them
from the customer's network or from the PN may have
an abuse adverse effect on the security or availability.
Denial of service using TTL expiry. Situations of the
TTL in customer's packages expiration may occur at the
core router. In this case, the router discards the packet
with the expired TTL and generates an ICMP response
message to the source packet sender.
 IP option attacks. Packets with IP options are usually
handled by a slow CPU and, therefore, can be used to
attack transit routers. A stream of packets that have an
alert label can adversely affect the core routers.</p>
    </sec>
    <sec id="sec-4">
      <title>This leads to increased</title>
      <p>processor capacity and</p>
    </sec>
    <sec id="sec-5">
      <title>Core routers overload.</title>
      <p>utilization of memory,
bandwidth.</p>
      <p>In addition, an attacker has wide opportunities to
implement security threats bypassing protective mechanisms,
because the fact of transmitting information on a compromised
channel is transparent. Modern network intelligence tools allow
to implement real-time traffic selection by defined
characteristics (IP addresses of the sender and receiver, ports,
the protocol used, etc.). Therefore, information about DIS
topology is available to an attacker through the topology states
attributes (TSA) even if there is no possibility to decode the
selected information. In other words, it is possible to discover
and build DIS topology model similarly to real DIS. Using this
information, an attacker is able to implement abusive and
malicious actions.</p>
      <p>II.</p>
    </sec>
    <sec id="sec-6">
      <title>METHODOLOGY</title>
      <p>In this section, we analyze performance indexes and
suggest method for the best-masked topology selection. Then,
we define main functions of masker and suggest addresses
change algorithm.</p>
      <p>To verify our hypotheses, we established masker in
simulation network model and attacked the protected nodes by
using Kali Linux tools. The experiment completes the evidence
and establishes the validity of hypothesis.</p>
      <sec id="sec-6-1">
        <title>A. Performance Indexes</title>
        <p>Define the parameters of the topology as the coordinates of
a multidimensional space. In this case, the real topology is
described by the state vector S (H1...H N ) , while H1...H N
are the parameters characterizing the properties of the DIS
topology. The state vector S' describes the masked topology. If
Hi and H'i are the components of topology state vectors then
the calculation of proximity measures between the real and
masked topologies is carried out using Euclidean distance,
since the use of other known proximity measures gives similar
results:</p>
        <p>R </p>
        <p>
          N
  Hi  H 'i 
i1
2
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
        </p>
        <p>
          For each variant of the masked topology, the following
performance indicators exist: (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) correlation index Rv without
regard to the intensity of interconnection, (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) correlation index
R'v with regard to the intensity of interconnection.
        </p>
        <p>When using the masker, a protected DIS topology is
generated, as a result, the attacker will operate with false
network nodes. To estimate the effectiveness of malicious
attack preventing, we use the accessibility index of the
protected node Q. If hi is the importance factor and ki  0,1
is the state factor, then:</p>
        <p>N
Q  k1,k2 ,...,kN    hiki
i1</p>
        <p>If n is the cost for one address, N is the number of nodes, m
is the cost for minimal unit of traffic and M is the intensity of
interconnection then the total cost Z for the implementation of
variant of the topology conversion include the following
components:</p>
        <p>Z  nN j  mM j</p>
        <p>Therefore, in order to choose the most acceptable topology
structure (Fig. 2), it is necessary to solve the multicriteria
optimization problem, which allows selecting the most
effective variant of the transformation. The results for the
estimation are presented in Table 1.</p>
      </sec>
      <sec id="sec-6-2">
        <title>B. Masker</title>
        <p>We build software, masker, to prevent network attacks.
Masker runs on a standard Linux host but needs basic packet
manipulation tool from repository: scapy. Scapy is used to
capture, rebuild and send generated network packets.</p>
        <p>
          Define main functions of system for masking network
topology based on the analysis presented in the previous
sections:
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
        </p>
        <p>TABLE I.</p>
        <p>CALCULATION RESULTS FOR PERFORMANCE INDEXES
Performance index</p>
        <p>Rv
R'v
Q
Z</p>
        <p>Starting a thread responsible for intercepting, changing
and forwarding IP-packets on the external interface of
the masker.</p>
        <p>Synchronization based on sending a sync packet.</p>
        <p>Creating an L2-socket for interaction on the external
interface.</p>
        <p>Starting a thread for intercepting, changing and
forwarding IP packets on the internal interface of the
masker.</p>
        <p>Starting a thread responsible for intercepting, changing
and forwarding IP-packets on the external interface of
the masker.</p>
        <p>Synchronization based on sending a sync packet.</p>
        <p>The results can be effectively represented in the form of a
vector diagram comparing the masked topologies (Fig. 3).</p>
        <p>III.</p>
        <p>CONCLUSION</p>
        <p>
          The results of the work allow us to conclude that there is a
significant increase protection level in distributed DIS,
including the increasing attacker's investigation resources to
implement abusive and malicious actions. For this, we used
false network objects in the network structure, which form a
masked topology. The structure of the masked topology deform
the information received by attacker's network intelligence: (
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
numbers of hosts, (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) software versions, (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) services, (
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
interface identifiers. The masking process does not affect the
interconnection between end-user nodes: it does not break the
established TCP sessions and does not prevent the
establishment of new ones.
        </p>
        <p>Masker exhibit obfuscated network topology for incorrect
reconstructing the structure of the protection DIS. Thus requires
redundancy in the structure to reduce the informative of real
interconnections, since structurally stationary DIS's topology is
R'v
especially valuable for attacker's network intelligence.</p>
        <p>Masker exhibit obfuscated network topology for incorrect
reconstructing the structure of the protection DIS. Thus requires
redundancy in the structure to reduce the informative of real
interconnections, since structurally stationary DIS's topology is
especially valuable for attacker's network intelligence.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fadin</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhalov</surname>
            <given-names>I.</given-names>
          </string-name>
          <article-title>Synthesis of Secure Software Development Controls</article-title>
          .
          <source>In Proceedings of the 8th International Conference on Security of Information and Networks (Sochi, Russian Federation, September 08-10</source>
          ,
          <year>2015</year>
          ).
          <source>SIN '15</source>
          . ACM New York, NY, USA,
          <year>2015</year>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>97</lpage>
          DOI: 10.1145/2799979.2799998.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Opara</surname>
            <given-names>E. U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Soluade</surname>
            <given-names>O. A. Straddling</given-names>
          </string-name>
          <article-title>the next cyber frontier: The empirical analysis on network security, exploits, and vulnerabilities</article-title>
          . In
          <source>International Journal of Electronics and Information Engineering</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>18</lpage>
          ,
          <year>2015</year>
          . DOI:
          <volume>10</volume>
          .6636/IJEIE.201509.
          <issue>2</issue>
          (
          <issue>3</issue>
          ).
          <fpage>02</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Cha</surname>
            ,
            <given-names>J. H.</given-names>
          </string-name>
          , Han,
          <string-name>
            <given-names>Y. H.</given-names>
            , &amp;
            <surname>Min</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. G.</surname>
          </string-name>
          <article-title>Named data networking over a Software-Defined Network using fixed-size content names</article-title>
          .
          <source>In IEICE Transactions on Communications</source>
          , Vol.
          <volume>E99B</volume>
          , No.
          <volume>7</volume>
          ,
          <issue>01</issue>
          .
          <fpage>07</fpage>
          .
          <year>2016</year>
          , p.
          <fpage>1455</fpage>
          -
          <lpage>1463</lpage>
          .. DOI:
          <volume>10</volume>
          .1587/transcom.2015EBP3464.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>You</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Junzhou</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jian</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <article-title>An inter-domain multipath flow transfer mechanism based on SDN and multi-domain collaboration</article-title>
          .
          <source>In in Proceedings of the 14th IFIP/IEEE International Symposium on Integrated Network Management (IM '15)</source>
          ,
          <year>2017</year>
          . pp.
          <fpage>758</fpage>
          -
          <lpage>761</lpage>
          . DOI:
          <volume>10</volume>
          .1109/INM.
          <year>2015</year>
          .
          <volume>7140369</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>BTSDN: BGP-based transition for the existing networks to SDN</article-title>
          .
          <source>In Proceedings of the 6th International Conference on Ubiquitous and Future Networks (ICUFN '14)</source>
          ,
          <year>2014</year>
          . pp.
          <fpage>419</fpage>
          -
          <lpage>424</lpage>
          . DOI:
          <volume>10</volume>
          .1109/ICUFN.
          <year>2014</year>
          .
          <volume>6876826</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kreutz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M. V.</given-names>
            <surname>Ramos</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Verissimo</surname>
          </string-name>
          <article-title>Towards secure and dependable software-defined networks</article-title>
          .
          <source>In Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN '13)</source>
          ,
          <year>2013</year>
          . pp.
          <fpage>55</fpage>
          -
          <lpage>60</lpage>
          . DOI:
          <volume>10</volume>
          .1145/2491185.2491199.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Crowcroft</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tarkoma</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Flinck</surname>
          </string-name>
          <article-title>Software defined networking for security enhancement in wireless mobile networks</article-title>
          .
          <source>In Computer Networks</source>
          ,
          <year>2014</year>
          . pp. .
          <volume>94</volume>
          -
          <fpage>101</fpage>
          . DOI:
          <volume>10</volume>
          . 1016/j.comnet.
          <year>2014</year>
          .
          <volume>03</volume>
          .009.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Fung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. L.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tarquini</surname>
          </string-name>
          , and
          <string-name>
            <surname>M. Anderson</surname>
          </string-name>
          <article-title>Survivability analysis of distributed systems using attack tree methodology</article-title>
          .
          <source>In IEEE Military Communications Conference Behal</source>
          ,
          <string-name>
            <given-names>S.</given-names>
            , &amp;
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review</article-title>
          . In
          <source>International Journal of Network Security</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>383</fpage>
          -
          <lpage>393</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .6633/IJNS.201703.
          <issue>19</issue>
          (
          <issue>3</issue>
          ).
          <fpage>07</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Hashemi</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          <string-name>
            <surname>He</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>An Evolutionary Multi-objective Approach for Modelling Network Security</article-title>
          . In
          <source>International Journal of Network Security</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>4</issue>
          , Pp.
          <fpage>528</fpage>
          -
          <lpage>536</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .6633/IJNS.201707.
          <issue>19</issue>
          (
          <issue>4</issue>
          ).
          <fpage>05</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Behnia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Rashid</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Chaudhry</surname>
          </string-name>
          <article-title>A survey of information security risk analysis methods</article-title>
          .
          <source>In Smart Computing Review</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>79</fpage>
          -
          <lpage>94</lpage>
          , Feb.
          <year>2012</year>
          . DOI:
          <volume>10</volume>
          .6029/smartcr.
          <year>2012</year>
          .
          <volume>01</volume>
          .007.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Amiri</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. R. Yousefi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Lucas</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Shakery</surname>
            , and
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Yazdani</surname>
          </string-name>
          ,
          <article-title>Feature selection for intrusion detection system using ant colony optimization</article-title>
          . In
          <source>International Journal of Network Security</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>420</fpage>
          -
          <lpage>432</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1016/j.jnca.
          <year>2011</year>
          .
          <volume>01</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Nezarat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model</article-title>
          . In
          <source>International Journal of Network Security</source>
          , vol.
          <volume>20</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>56</fpage>
          -
          <lpage>64</lpage>
          , Jan.
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .6633/IJNS.201801.
          <issue>20</issue>
          (
          <issue>1</issue>
          ).
          <fpage>07</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Borisaniya</surname>
          </string-name>
          , and
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Modi Collaborative IDS framework for cloud</article-title>
          .
          <source>International Journal of Network Security</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>699</fpage>
          -
          <lpage>709</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -94-007-2911-
          <issue>7</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tayal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mishra</surname>
          </string-name>
          and
          <string-name>
            <surname>S. Sharma</surname>
          </string-name>
          <article-title>Active monitoring &amp; postmortem forensic analysis of network threats: A survey</article-title>
          . In
          <source>International Journal of Electronics and Information Engineering</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>59</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .6636/IJEIE.201703.
          <issue>6</issue>
          (
          <issue>1</issue>
          ).
          <fpage>05</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singhal</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Jajodia</surname>
          </string-name>
          <article-title>Toward measuring network security using attack graphs</article-title>
          .
          <source>In Proceedings of the ACM Workshop on Quality of Protection</source>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>54</lpage>
          ,
          <year>October 2007</year>
          . DOI:
          <volume>10</volume>
          .1145/1314257.1314273.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>