2015
DOI: 10.1007/s10799-015-0232-6
|View full text |Cite
|
Sign up to set email alerts
|

Integrating attacker behavior in IT security analysis: a discrete-event simulation approach

Abstract: When designing secure information systems, a profound understanding of the threats that they are exposed to is indispensable. Today's most severe risks come from malicious threat agents exploiting a variety of attack vectors to achieve their goals, rather than from random opportunistic threats such as malware. Most security analyses, however, focus on fixing technical weaknesses, but do not account for sophisticated combinations of attack mechanisms and heterogeneity in adversaries' motivations, resources, cap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…Table 3 lists the probabilities of these nodes at the certain time period. The attack probability for each vulnerability is computed through the game Nash equilibrium, and the attack probability for each node, recorded as "tot" in the table, is computed through (15). From the table we can see that, for some vulnerability, the attack probability decreased to zero and never increase, such as the vulnerability 2 in node 1, which means this vulnerability had been fixed at certain time.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 3 lists the probabilities of these nodes at the certain time period. The attack probability for each vulnerability is computed through the game Nash equilibrium, and the attack probability for each node, recorded as "tot" in the table, is computed through (15). From the table we can see that, for some vulnerability, the attack probability decreased to zero and never increase, such as the vulnerability 2 in node 1, which means this vulnerability had been fixed at certain time.…”
Section: Methodsmentioning
confidence: 99%
“…Analyzing the attacker behavior is of great importance when measuring the network security. Ekelhart et al [15] developed a simulation-driven approach which took attack strategies and attacker behavior into consideration. AlJarrah and Arafat [16] used the time delay neural network which embedded the temporal behavior of the attacks to maximize the recognition rate of network.…”
Section: Related Workmentioning
confidence: 99%
“…These metrics are gathered into families, which are combined into a risk metric for the network. A simulation-driven approach is developed by [29] for secure information system design. This method can be utilized by security analysts to determine (a) the capability of a modeled system to deal with attacks and (b) the result of alterations of the system on its overall security.…”
Section: Introductionmentioning
confidence: 99%
“…Recently several AIOS techniques have been developed for proactive defense decisions like sandboxing (Malkhi and Reiter, 2000) and isolation (Liu et al, 2000). Proactive decisions in real time scenario is very difficult since alerts from intrusion detection system (IDS) detected in earlier stage of attack leads to many false alarms (Ekelhart et al, 2015). Such misinterpretations have been found to be very expensive in terms of both denial of service (DoS) and resource depletion (Thakar et al, 2010).…”
Section: Introductionmentioning
confidence: 99%