Modeling active cyber attack for network vulnerability assessment

  • Authors:
  • Jung-Ho Eom;Young-Ju Han;Tai-Myoung Chung

  • Affiliations:
  • Internet Management Technology Laboratory, Scool of Information and Communication Engineering, SungKyunKwan University, Gyeonggi-do, Republic of Korea;Internet Management Technology Laboratory, Scool of Information and Communication Engineering, SungKyunKwan University, Gyeonggi-do, Republic of Korea;Internet Management Technology Laboratory, Scool of Information and Communication Engineering, SungKyunKwan University, Gyeonggi-do, Republic of Korea

  • Venue:
  • ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we considered active cyber attack model to assess vulnerability in network system. As we simulate cyber attack model in the network system, we can identify vulnerabilities, and provide appropriate countermeasures against them. Our model consists of two agents, two modules, and action controller on on-line system, and attack damage assessment analyzer on off-line system. We can minimize a detection probability from target system because we applied 'Sensor to Shooter' concept to our model, and separated information collection agent and attack agent for reduce attack action time. One module analyzes target system's information. Another module develops target system and main point of impact, and builds attack scenario consisted of attack tree and attack pattern. Attack action agents execute the set of attack sequence which consists of attack pattern in attack tree's each node. Action controller controls all execution process of our model's elements.