Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack

被引:0
|
作者
Naik, Nitin [1 ]
Jenkins, Paul [2 ]
Grace, Paul [1 ]
Prajapat, Shaligram [3 ]
Naik, Dishita [4 ]
Song, Jingping [5 ]
Xu, Jian [5 ]
Czekster, Ricardo M. [1 ]
机构
[1] Aston Univ, Sch Comp Sci & Digital Technol, Birmingham, England
[2] Cardiff Metropolitan Univ, Cardiff Sch Technol, Cardiff, Wales
[3] Devi Ahilya Univ, Int Inst Profess Studies, Indore, India
[4] Birmingham City Univ, Birmingham, England
[5] Northeastern Univ, Software Coll, Shenyang, Peoples R China
关键词
Cyberattack analysis; Attack tree; Weighted mean probability of attack; Weighted mean risk of attack; Information theft attack;
D O I
10.1007/978-3-031-47508-5_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals alike, and causing financial and reputational loss as a result. Numerous cyberattack analysis methods are available to analyse the risk of cyberattacks and offer the appropriate mitigation strategy. Nonetheless, several cyberattack analysis methods may not be effective and applicable in all cyberattack conditions due to several reasons such as their cost, complexity, resources and expertise. Therefore, this paper builds on an economical, simple and adaptable method for cyberattack analysis using an attack tree with weighted mean probability and risk of attack. It begins with an examination of a weighted mean approach followed by an investigation of the different types of weighted mean functions. Utilizing a series of orderly steps to perform a cyberattack analysis and assess its potential risk in an easy and effective manner. This method provides the means to calculate the potential risk of attack and therefore any mitigation that can be employed to minimise its effect.
引用
收藏
页码:351 / 363
页数:13
相关论文
共 50 条
  • [21] Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis
    Pekergin, Nihal
    Tan, Sovanna
    Fourneau, Jean-Michel
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016, 2016, 9987 : 119 - 133
  • [22] Efficient and Generic Algorithms for Quantitative Attack Tree Analysis
    Lopuhaa-Zwakenberg, Milan
    Budde, Carlos E.
    Stoelinga, Marielle
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4169 - 4187
  • [23] Survivability Analysis of SOA based on Attack Tree Models
    Xiao, Yi
    Wang, Yong J.
    Huang, Zun G.
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 819 - 823
  • [24] Threat Analysis of Cyber Attacks with Attack Tree+
    Wang, Ping (pingwang@mail.ksu.edu.tw), 1600, Ubiquitous International (05):
  • [25] An Attack Tree Based Risk Evaluation Approach For The Internet of Things
    Asif, Waqar
    Ray, Indranil Ghosh
    Rajarajan, Muttukrishnan
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT'18), 2018,
  • [26] Risk Assessment of Attack in Autonomous Vehicle based on a Decision Tree
    Ftaimi, Sara
    Mazri, Tomader
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 792 - 801
  • [27] A RISK ASSESSMENT SCHEME OF INTELLIGNET TERMINAL BASED ON ATTACK TREE
    Wei, Fang
    Zhang, Miao
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 67 - 71
  • [28] Accessing Risk Priority of SSL SYN Attack using Game Theoretic Attack Defense Tree Model for VANETs
    Garg, Sahil
    Aujla, Gagangeet Singh
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 729 - 734
  • [29] Predicting Lung Healthiness Risk Scores to Identify Probability of an Asthma Attack
    Do Quan
    Doig, Alexa
    Son Tran Cao
    Chaudri, Jamil
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 424 - 431
  • [30] A Weighted Statistical Analysis of DPA Attack on an ASIC AES Implementation
    Qian, Guoyu
    Zhou, Ying
    Xing, Yueying
    Fan, Yibo
    Tsunoo, Yukiyasu
    Goto, Satoshi
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 906 - +