首页> 外文期刊>Recent Patents on Telecommunications >A Method for Estimating the Uncertainties in Attacker's Behavior Using Attack Graph Structure
【24h】

A Method for Estimating the Uncertainties in Attacker's Behavior Using Attack Graph Structure

机译:一种利用攻击图结构估算攻击者行为不确定性的方法

获取原文
获取原文并翻译 | 示例
       

摘要

Background: Predicting attacker's behavior plays an important role in network security assessment. Attack graphs systematically classify the possible intrusion paths against a system. For our purpose, we assume the attack graph structure comprised of states and transitions between them. Each state represents an attack phase (or adversarial action) and each transition indicates a possible action of attacker. Objective: In this paper, we use the attack graph structure to propose a new method for predicting the behavior of attackers. The goal of this method is to measure how attackers with different level of capabilities, access and budget prefer to select their path to conduct an attack. Method: In the proposed method, attackers are considered as active agents with different levels of skill, access and budget. All possible attack scenarios are modeled by using the attack graph structure. The attack graph model is parameterized by appropriate data such as the access complexity, the required skill and the required budget as the inputs of the model. Results: The outputs of the proposed method are the desired security metrics such as the selection probabilities of different attack scenarios and the attractiveness degree of attack paths from the attacker's point of view. Conclusion: One of the main preferences of attackers is due to the lack of the experience and security education of the users. The local and physical attacks have not high priority for attackers to launch an attack. The user's systems and workstations are more vulnerable than the data server.
机译:背景:预测攻击者的行为在网络安全评估中起着重要作用。攻击图系统地分类了针对系统的可能入侵路径。出于我们的目的,我们假设攻击图结构由状态和状态之间的过渡组成。每个状态代表攻击阶段(或对抗行动),每个过渡都表示攻击者可能采取的行动。目的:本文使用攻击图结构提出了一种预测攻击者行为的新方法。此方法的目标是衡量功能,访问权限和预算水平不同的攻击者如何选择选择进行攻击的路径。方法:在提出的方法中,攻击者被视为具有不同技能,访问权限和预算的活跃代理。使用攻击图结构对所有可能的攻击场景进行建模。攻击图模型由适当的数据参数化,例如访问复杂性,所需技能和所需预算,作为模型的输入。结果:所提出方法的输出是所需的安全度量,例如从攻击者的角度来看,不同攻击场景的选择概率以及攻击路径的吸引力程度。结论:攻击者的主要偏爱之一是由于缺乏用户的经验和安全教育。对于攻击者而言,本地和物理攻击的优先级并不高。用户的系统和工作站比数据服务器更容易受到攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号