Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack

被引:0
|
作者
Naik, Nitin [1 ]
Jenkins, Paul [2 ]
Grace, Paul [1 ]
Prajapat, Shaligram [3 ]
Naik, Dishita [4 ]
Song, Jingping [5 ]
Xu, Jian [5 ]
Czekster, Ricardo M. [1 ]
机构
[1] Aston Univ, Sch Comp Sci & Digital Technol, Birmingham, England
[2] Cardiff Metropolitan Univ, Cardiff Sch Technol, Cardiff, Wales
[3] Devi Ahilya Univ, Int Inst Profess Studies, Indore, India
[4] Birmingham City Univ, Birmingham, England
[5] Northeastern Univ, Software Coll, Shenyang, Peoples R China
关键词
Cyberattack analysis; Attack tree; Weighted mean probability of attack; Weighted mean risk of attack; Information theft attack;
D O I
10.1007/978-3-031-47508-5_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals alike, and causing financial and reputational loss as a result. Numerous cyberattack analysis methods are available to analyse the risk of cyberattacks and offer the appropriate mitigation strategy. Nonetheless, several cyberattack analysis methods may not be effective and applicable in all cyberattack conditions due to several reasons such as their cost, complexity, resources and expertise. Therefore, this paper builds on an economical, simple and adaptable method for cyberattack analysis using an attack tree with weighted mean probability and risk of attack. It begins with an examination of a weighted mean approach followed by an investigation of the different types of weighted mean functions. Utilizing a series of orderly steps to perform a cyberattack analysis and assess its potential risk in an easy and effective manner. This method provides the means to calculate the potential risk of attack and therefore any mitigation that can be employed to minimise its effect.
引用
收藏
页码:351 / 363
页数:13
相关论文
共 50 条
  • [31] PROBABILITY OF ATTACK BY SOUTHERN PINE BEETLE IN RELATION TO DISTANCE FROM AN ATTRACTIVE HOST TREE
    JOHNSON, PC
    COSTER, JE
    FOREST SCIENCE, 1978, 24 (04) : 574 - 580
  • [32] WHTE: Weighted Hoeffding Tree Ensemble for Network Attack Detection at Fog-IoMT
    Hameed, Shilan S.
    Selamat, Ali
    Latiff, Liza Abdul
    Razak, Shukor A.
    Krejcar, Ondrej
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND PRACTICES IN ARTIFICIAL INTELLIGENCE, 2022, 13343 : 485 - 496
  • [33] Mean Value Analysis of Critical Attack Paths with Multiple Parameters
    Patil, Rajendra Shivaji
    Fodor, Viktoria
    Ekstedt, Mathias
    SECURE IT SYSTEMS, NORDSEC 2023, 2024, 14324 : 126 - 143
  • [34] Modeling of Intentional Attack in Risk Analysis Methods
    Li Shu-ying
    Shen Shi-fei
    Hu Xiao-feng
    Yao Wei
    PROCEEDINGS OF ISCRAM ASIA 2012 CONFERENCE ON INFORMATION SYSTEMS FOR CRISIS RESPONSE AND MANAGEMENT, 2012, : 236 - 241
  • [35] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [36] Cyber Attack Grammars for Risk/Cost Analysis
    Patten, Terry
    Mitchell, Daniel
    Call, Catherine
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 597 - 605
  • [37] An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
    Naik, Nitin
    Grace, Paul
    Jenkins, Paul
    Naik, Kshirasagar
    Song, Jingping
    COMPUTERS & SECURITY, 2022, 120
  • [38] Attack Tree Based Android Malware Detection with Hybrid Analysis
    Zhao, Shuai
    Li, Xiaohong
    Xu, Guangquan
    Zhang, Lei
    Feng, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 380 - 387
  • [39] Network security equipment evaluation based on attack tree with risk fusion
    CHENG Ran
    LU Yue-ming
    网络与信息安全学报, 2017, 3 (07) : 70 - 77
  • [40] Risk Assessment of Cyber Attacks in ECPS Based on Attack Tree and AHP
    Ru, Yeqi
    Wang, Yufei
    Li, June
    Liu, Jian
    Yang, Guotai
    Yuan, Kai
    Liu, Kaipei
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 465 - 470