2017
DOI: 10.1177/1548512917725408
|View full text |Cite
|
Sign up to set email alerts
|

Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach

Abstract: Existing research on cyber threat assessment focuses on analyzing the network vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise networks, however, vary significantly due to not only network and system configurations, but also the attacker’s strategies. This work proposes a cyber-based attacker behavior model (ABM) in conjunction with the Cyber Attack Scenario and Network Defense Simulator to model the interaction between the network and the attackers. The ABM leverage… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…This framework utilizes Cyber Kill Chain behavior to model an attacker's decisions while taking into account what the attacker knows, how the attacker learns about the network, the vulnerabilities, and targets. Similar to our work is the extension provided by Moskal et al [39], which proposed the red and blue team's simulation framework to show the interplay between an attacker and defender. The framework was defined based on the network, the attackers, and the intentions, the dependencies between the attacker and the network including capabilities and pref-erences.…”
Section: A Security Model Automation For Red Team and Blue Teammentioning
confidence: 71%
“…This framework utilizes Cyber Kill Chain behavior to model an attacker's decisions while taking into account what the attacker knows, how the attacker learns about the network, the vulnerabilities, and targets. Similar to our work is the extension provided by Moskal et al [39], which proposed the red and blue team's simulation framework to show the interplay between an attacker and defender. The framework was defined based on the network, the attackers, and the intentions, the dependencies between the attacker and the network including capabilities and pref-erences.…”
Section: A Security Model Automation For Red Team and Blue Teammentioning
confidence: 71%
“…Since cyberspace is subjected to severe attacks with drastic consequences at a very high speed and complete anonymity [62], modeling threats and vulnerabilities using a probabilistic approach in risk assessment might deliver a better prospect for the entire security system. PRA also includes analysis of adversaries that can be performed based on their capability, opportunity, and intent to build behavioral characteristics [18].…”
Section: H Discussionmentioning
confidence: 99%
“…The capability of the adversaries determines the severity level of the impact after attacks. The adversaries can consist of terrorists, criminals, extremists or demonstrators, outsider agents, and insider agents [18], [64], [44], [65], [66], with their respective capacity and capability based on their financial and technical assets. The better the capacity of the adversaries to execute the attack, the more significant is the probability of the attack succeeding.…”
Section: H Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The risk depends upon the paths where a vulnerability appears, and the policy computes the smallest set of patches to stop all the paths. We discover paths through twinbased adversary emulation (Applebaum et al 2016(Applebaum et al , 2017Eckhart and Ekelhart 2019;Moskal et al 2018;Strom et al 2018) and automate it through the Haruspex platform (Baiardi and Sgandurra 2013;. The platform uses the twins to run multiple independent adversary emulations to cover stochastic factors such as the success or the failure of an attack.…”
Section: Introductionmentioning
confidence: 99%