Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack

被引:0
|
作者
Naik, Nitin [1 ]
Jenkins, Paul [2 ]
Grace, Paul [1 ]
Prajapat, Shaligram [3 ]
Naik, Dishita [4 ]
Song, Jingping [5 ]
Xu, Jian [5 ]
Czekster, Ricardo M. [1 ]
机构
[1] Aston Univ, Sch Comp Sci & Digital Technol, Birmingham, England
[2] Cardiff Metropolitan Univ, Cardiff Sch Technol, Cardiff, Wales
[3] Devi Ahilya Univ, Int Inst Profess Studies, Indore, India
[4] Birmingham City Univ, Birmingham, England
[5] Northeastern Univ, Software Coll, Shenyang, Peoples R China
关键词
Cyberattack analysis; Attack tree; Weighted mean probability of attack; Weighted mean risk of attack; Information theft attack;
D O I
10.1007/978-3-031-47508-5_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals alike, and causing financial and reputational loss as a result. Numerous cyberattack analysis methods are available to analyse the risk of cyberattacks and offer the appropriate mitigation strategy. Nonetheless, several cyberattack analysis methods may not be effective and applicable in all cyberattack conditions due to several reasons such as their cost, complexity, resources and expertise. Therefore, this paper builds on an economical, simple and adaptable method for cyberattack analysis using an attack tree with weighted mean probability and risk of attack. It begins with an examination of a weighted mean approach followed by an investigation of the different types of weighted mean functions. Utilizing a series of orderly steps to perform a cyberattack analysis and assess its potential risk in an easy and effective manner. This method provides the means to calculate the potential risk of attack and therefore any mitigation that can be employed to minimise its effect.
引用
收藏
页码:351 / 363
页数:13
相关论文
共 50 条
  • [41] Quantitative Attack Tree Analysis via Priced Timed Automata
    Kumar, Rajesh
    Ruijters, Enno
    Stoelinga, Marielle
    FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS (FORMATS 2015), 2015, 9268 : 156 - 171
  • [42] THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity
    Chlup, Sebastian
    Christl, Korbinian
    Schmittner, Christoph
    Shaaban, Abdelkader Magdy
    Schauer, Stefan
    Latzenhofer, Martin
    INFORMATION, 2023, 14 (01)
  • [43] Attack Tree Analysis for Insider Threats on the IoT Using Isabelle
    Kammuller, Florian
    Nurse, Jason R. C.
    Probst, Christian W.
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 234 - 246
  • [44] AN ATTACK-FAULT TREE ANALYSIS OF A MOVABLE RAILROAD BRIDGE
    Jablonski, Matthew
    Wang, Yongxin
    Yavvari, Chaitanya
    Wang, Zezhou
    Liu, Xiang
    Holt, Keith
    Wijesekera, Duminda
    CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 51 - 71
  • [45] Dynamic Security Level Analysis Method Using Attack Tree
    Kato, Yuya
    Kanai, Atsushi
    Tanimoto, Shigeaki
    Hatashima, Takashi
    2017 IEEE 6TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2017,
  • [46] Survivability analysis of distributed systems using attack tree methodology
    Fung, Casey
    Chen, Yi-Liang
    Wang, Xinyu
    Lee, Joseph
    Tarquini, Richard
    Anderson, Mark
    Linger, Richard
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 583 - 589
  • [47] Representation of Attacker Motivation in Software Risk Assessment Using Attack Probability Trees
    Esche, Marko
    Toro, Federico Grasso
    Thiel, Florian
    PROCEEDINGS OF THE 2017 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2017, : 763 - 771
  • [48] Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree
    Gao, Xueqin
    Shang, Tao
    Li, Da
    Liu, Jianwei
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [49] An Attack Tree based Risk Assessment for Location Privacy in Wireless Sensor Networks
    Jiang, Rong
    Luo, Jun
    Wang, Xiaoping
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [50] RISK-DISTORTION ANALYSIS FOR VIDEO COLLUSION ATTACK
    Chen, Yan
    Lin, W. Sabrina
    Liu, K. J. Ray
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 1441 - 1444