Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack

被引:0
|
作者
Naik, Nitin [1 ]
Jenkins, Paul [2 ]
Grace, Paul [1 ]
Prajapat, Shaligram [3 ]
Naik, Dishita [4 ]
Song, Jingping [5 ]
Xu, Jian [5 ]
Czekster, Ricardo M. [1 ]
机构
[1] Aston Univ, Sch Comp Sci & Digital Technol, Birmingham, England
[2] Cardiff Metropolitan Univ, Cardiff Sch Technol, Cardiff, Wales
[3] Devi Ahilya Univ, Int Inst Profess Studies, Indore, India
[4] Birmingham City Univ, Birmingham, England
[5] Northeastern Univ, Software Coll, Shenyang, Peoples R China
关键词
Cyberattack analysis; Attack tree; Weighted mean probability of attack; Weighted mean risk of attack; Information theft attack;
D O I
10.1007/978-3-031-47508-5_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals alike, and causing financial and reputational loss as a result. Numerous cyberattack analysis methods are available to analyse the risk of cyberattacks and offer the appropriate mitigation strategy. Nonetheless, several cyberattack analysis methods may not be effective and applicable in all cyberattack conditions due to several reasons such as their cost, complexity, resources and expertise. Therefore, this paper builds on an economical, simple and adaptable method for cyberattack analysis using an attack tree with weighted mean probability and risk of attack. It begins with an examination of a weighted mean approach followed by an investigation of the different types of weighted mean functions. Utilizing a series of orderly steps to perform a cyberattack analysis and assess its potential risk in an easy and effective manner. This method provides the means to calculate the potential risk of attack and therefore any mitigation that can be employed to minimise its effect.
引用
收藏
页码:351 / 363
页数:13
相关论文
共 50 条
  • [1] Cyberattack Analysis Based on Attack Tree withWeighted Average Probability and Risk of Attack
    Naik, Nitin
    Jenkins, Paul
    Grace, Paul
    ADVANCES IN COMPUTATIONAL INTELLIGENCE SYSTEMS, UKCI 2022, 2024, 1454 : 324 - 333
  • [2] Attack tree analysis
    Wiseman, D. R.
    RISK, RELIABILITY AND SAFETY: INNOVATING THEORY AND PRACTICE, 2017, : 1023 - 1027
  • [3] Attack-Tree Series: A Case for Dynamic Attack Tree Analysis
    Gadyatskaya, Olga
    Mauw, Sjouke
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2019, 2019, 11720 : 7 - 19
  • [4] Possible Does Not Mean Useful: The Role of Probability of Attack in Security Risk Management
    Wyss, Gregory D.
    Williams, Adam D.
    NUCLEAR SCIENCE AND ENGINEERING, 2023, 197 (sup1) : S80 - S94
  • [5] CubeSat Security Attack Tree Analysis
    Falco, Gregory
    Viswanathan, Arun
    Santangelo, Andrew
    8TH IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY (SMC-IT 2021), 2021, : 68 - 76
  • [6] Fuzzy quantitative attack tree analysis
    Dang, Thi Kim Nhung
    Lopuhaa-Zwakenberg, Milan
    Stoelinga, Marielle
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2024, 2024, 14573 : 210 - 231
  • [7] A Survey of Fault and Attack Tree Modeling and Analysis for Cyber Risk Management
    Nagaraju, Vidhyashree
    Fiondella, Lance
    Wandji, Thierry
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
  • [8] Attack Detection Application with Attack Tree for Mobile System using Log Analysis
    Duhoe Kim
    Dongil Shin
    Dongkyoo Shin
    Yong-Hyun Kim
    Mobile Networks and Applications, 2019, 24 : 184 - 192
  • [9] Fast attack detection system using log analysis and attack tree generation
    Kim, Duhoe
    Kim, Yong-Hyun
    Shin, Dongil
    Shin, Dongkyoo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1827 - 1835
  • [10] Fast attack detection system using log analysis and attack tree generation
    Duhoe Kim
    Yong-Hyun Kim
    Dongil Shin
    Dongkyoo Shin
    Cluster Computing, 2019, 22 : 1827 - 1835