【24h】

Breaking the Cyber Kill Chain by Modelling Resource Costs

机译:通过建模资源成本来打破网络杀戮链

获取原文

摘要

To combat cybercrime, a clearer understanding of the attacks and the offenders is necessary. When there is little available data about attack incidents, which is usually the case for new technology, one can make estimations about the necessary investments an offender would need to compromise the system. The next step would be to implement measures that increase these costs to a level that makes the attack unattractive. Our research method follows the principles of design science, where cycles of research activities are used to create artefacts intended to solve real-world problems. Our artefacts are an approach for creating a resource costs model (RCM) and an accompanying modelling tool implemented as a web application. These are used to find the required attacker resources at each stage of the cyber kill chain. End user feedback show that structured visualisation of the required resources raises the awareness of the cyberthreat. This approach has its strength and provides best accuracy with specific attacks, but is more limited when there are many possible attack vectors of different types.
机译:为了打击网络犯罪,更清楚地了解攻击和罪犯是必要的。当有关攻击事件的可用数据时,这通常是新技术的情况,可以估计关于必要的投资,违法者需要妥协系统。下一步是实施将这些成本提高到使攻击没有吸引力的水平的措施。我们的研究方法遵循设计科学的原则,研究活动的循环用于创造旨在解决现实世界问题的人工制品。我们的艺术品是一种创建资源成本模型(RCM)的方法以及作为Web应用程序实现的附带的建模工具。这些用于在Cyber​​ Kill链的每个阶段找到所需的攻击者资源。最终用户反馈表明,所需资源的结构性可视化引发了网络滑轨的认识。这种方法具有其强度,并提供特定攻击的最佳准确性,但在不同类型可能的攻击载体时更有限。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号