A requires/provides model for computer attacks
Proceedings of the 2000 workshop on New security paradigms
A process control approach to cyber attack detection
Communications of the ACM
A Structural Framework for Modeling Multi-Stage Network Attacks
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
Hi-index | 0.00 |
In this paper, we considered active cyber attack model to assess vulnerability in network system. As we simulate cyber attack model in the network system, we can identify vulnerabilities, and provide appropriate countermeasures against them. Our model consists of two agents, two modules, and action controller on on-line system, and attack damage assessment analyzer on off-line system. We can minimize a detection probability from target system because we applied 'Sensor to Shooter' concept to our model, and separated information collection agent and attack agent for reduce attack action time. One module analyzes target system's information. Another module develops target system and main point of impact, and builds attack scenario consisted of attack tree and attack pattern. Attack action agents execute the set of attack sequence which consists of attack pattern in attack tree's each node. Action controller controls all execution process of our model's elements.