Active Cyber Attack Model for Network System's Vulnerability Assessment

  • Authors:
  • Jung-ho Eom;Young-Ju Han;Seon-Ho Park;Tai-Myoung Chung

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ICISS '08 Proceedings of the 2008 International Conference on Information Science and Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we architected active cyber attack model for assessing network system's vulnerability. As simulating cyber attack model in network system, we can identify the weakest point and inspect security policy. It also improved the capability of information collection and attack action, as using autonomous agents. Attack action agents which introduced attack a set of sequence number can reduce transmission overhead and hide attack scenario's infor- mation. We built attack scenario for attack process and technique of attack action agents. It is composed of attack pattern and tree. Action controller uses node's attack success percent(ASP) to choose the second best attack scenario after the first attack was failed. ASP is calculated with the ratio of all achieved events until the sub-node over all nodes of the attack tree. Keywords cyber attack, attack tree, attack pattern