Loading...
Please wait, while we are loading the content...
Similar Documents
Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
| Content Provider | Semantic Scholar |
|---|---|
| Author | Moskal, Stephen F. Yang, Shanchieh Jay Kuhl, Michael E. |
| Copyright Year | 2018 |
| Abstract | Existing research on cyber threat assessment focuses on analyzing the network vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise networks, however, vary significantly due to not only network and system configurations, but also the attacker's strategies. This work proposes a cyber-based attacker behavior model (ABM) in conjunction with the Cyber Attack Scenario and Network Defense Simulator to model the interaction between the network and the attackers. The ABM leverages a knowledge-based design and factors in the capability, opportunity, intent, preference, and Cyber Attack Kill Chain integration to model various types of attackers. By varying the types of attackers and the network configurations, and simulating their interactions, we present a method to measure the overall network security against cyber attackers under different scenarios. Simulation results based on four attacker types on two network configurations are shown to demonstrate how different attacker behaviors may lead to different ways to penetrate a network, and how a single misconfiguration may impact network security. |
| Starting Page | 13 |
| Ending Page | 29 |
| Page Count | 17 |
| File Format | PDF HTM / HTML |
| DOI | 10.1177/1548512917725408 |
| Volume Number | 15 |
| Alternate Webpage(s) | https://www.rit.edu/academicaffairs/facultyscholarship/submit/download_file.php?id=56165 |
| Alternate Webpage(s) | https://doi.org/10.1177/1548512917725408 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |