Modeling advanced persistent threats using risk matrix methods

被引:1
|
作者
Ivanova, Nina D. [1 ]
Ivanenko, Vitaliy G. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Dept Informat Secur, Moscow Engn Phys Inst, Moscow 115409, Russia
关键词
Advanced persistent threat; Threat model; Risk matrix models; Clustering methods;
D O I
10.1007/s11416-022-00440-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of the study is to assess the security of information systems during an influence of advanced persistent threats. The article shows the need to build a threat model during an analyzing the security of information systems. Various approaches to modeling threats in information systems are considered, their advantages and disadvantages are noted, requirements for the developed methodology are formed. As a result of the study, a method for modeling computer attack scenarios and assessing the security of information systems under the influence of advanced persistent threats is formed, based on the use of risk matrix models. A method for determining categorical variables characterizing the probability and damage as a result of the implementation of information threats using clustering methods is also proposed. The example demonstrates the use of a graph of threat matrices for modeling scenarios of targeted computer attacks on information system assets. The scientific novelty of the work consists in the proposal of a method for analyzing the security of information systems, which takes into account the possibility of changing the probability of the implementation of information threats during the life cycle of an advanced persistent threat, the dependence of information threats and the value of information assets for the intruder and their owner, which makes it possible to predict various scenarios of computer attacks.
引用
收藏
页码:367 / 372
页数:6
相关论文
共 50 条
  • [1] Modeling advanced persistent threats using risk matrix methods
    Nina D. Ivanova
    Vitaliy G. Ivanenko
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 367 - 372
  • [2] Modeling social worm propagation for advanced persistent threats
    Zhou, Peng
    Gu, Xiaojing
    Nepal, Surya
    Zhou, Jianying
    COMPUTERS & SECURITY, 2021, 108
  • [3] Advanced Persistent Threats
    Ozzengin, Yavuz Selim
    Sakiz, Fatih
    Benzer, Recep
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1845 - 1848
  • [4] A Study on Advanced Persistent Threats
    Chen, Ping
    Desmet, Lieven
    Huygens, Christophe
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 63 - 72
  • [5] Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
    Gan, Chenquan
    Lin, Jiabin
    Huang, Da-Wen
    Zhu, Qingyi
    Tian, Liang
    MATHEMATICS, 2023, 11 (14)
  • [6] Modeling Observability in Adaptive Systems to Defend Against Advanced Persistent Threats
    Kinneer, Cody
    Wagner, Ryan
    Fang, Fei
    Le Goues, Claire
    Garlan, David
    17TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2019,
  • [7] Systems Dynamics Modeling for Evaluating SocioTechnical Vulnerabilities in Advanced Persistent Threats
    Nicho, Mathew
    Girija, Shini
    2022 15TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION (HSI), 2022,
  • [8] Evolving Risk Management Against Advanced Persistent Threats in Fog Computing
    Feng, Shaohan
    Xiong, Zehui
    Niyato, Dusit
    Wang, Ping
    Leshem, Amir
    2018 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2018,
  • [9] A Practical Study on Advanced Persistent Threats
    Jeun, Inkyung
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 144 - +
  • [10] Advanced Persistent Threats & Social Engineering
    Weippl, Edgar
    2014 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2014, : IS21 - IS21