A Method for Estimating the Uncertainties in Attacker’s Behavior Using Attack Graph Structure | BenthamScience


A Method for Estimating the Uncertainties in Attacker’s Behavior Using Attack Graph Structure

Author(s): Letafat Sadat Mohajirani, Hamed Orojloo*.

Journal Name: Recent Advances in Communications and Networking Technology

Volume 6 , Issue 1 , 2017

Graphical Abstract:


Abstract:

Background: Predicting attacker’s behavior plays an important role in network security assessment. Attack graphs systematically classify the possible intrusion paths against a system. For our purpose, we assume the attack graph structure comprised of states and transitions between them. Each state represents an attack phase (or adversarial action) and each transition indicates a possible action of attacker.

Objective: In this paper, we use the attack graph structure to propose a new method for predicting the behavior of attackers. The goal of this method is to measure how attackers with different level of capabilities, access and budget prefer to select their path to conduct an attack.

Method: In the proposed method, attackers are considered as active agents with different levels of skill, access and budget. All possible attack scenarios are modeled by using the attack graph structure. The attack graph model is parameterized by appropriate data such as the access complexity, the required skill and the required budget as the inputs of the model.

Results: The outputs of the proposed method are the desired security metrics such as the selection probabilities of different attack scenarios and the attractiveness degree of attack paths from the attacker’s point of view.

Conclusion: One of the main preferences of attackers is due to the lack of the experience and security education of the users. The local and physical attacks have not high priority for attackers to launch an attack. The user’s systems and workstations are more vulnerable than the data server.

Keywords: Computer networks, information systems, security, quantitative evaluation, attack graph, workstations.

Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 6
ISSUE: 1
Year: 2017
Page: [26 - 40]
Pages: 15
DOI: 10.2174/2215081106666170102150016
Price: $58

Article Metrics

PDF: 8
HTML: 1
EPUB: 1