Modeling advanced persistent threats using risk matrix methods

被引:1
|
作者
Ivanova, Nina D. [1 ]
Ivanenko, Vitaliy G. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Dept Informat Secur, Moscow Engn Phys Inst, Moscow 115409, Russia
关键词
Advanced persistent threat; Threat model; Risk matrix models; Clustering methods;
D O I
10.1007/s11416-022-00440-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of the study is to assess the security of information systems during an influence of advanced persistent threats. The article shows the need to build a threat model during an analyzing the security of information systems. Various approaches to modeling threats in information systems are considered, their advantages and disadvantages are noted, requirements for the developed methodology are formed. As a result of the study, a method for modeling computer attack scenarios and assessing the security of information systems under the influence of advanced persistent threats is formed, based on the use of risk matrix models. A method for determining categorical variables characterizing the probability and damage as a result of the implementation of information threats using clustering methods is also proposed. The example demonstrates the use of a graph of threat matrices for modeling scenarios of targeted computer attacks on information system assets. The scientific novelty of the work consists in the proposal of a method for analyzing the security of information systems, which takes into account the possibility of changing the probability of the implementation of information threats during the life cycle of an advanced persistent threat, the dependence of information threats and the value of information assets for the intruder and their owner, which makes it possible to predict various scenarios of computer attacks.
引用
收藏
页码:367 / 372
页数:6
相关论文
共 50 条
  • [31] An advanced system for Modeling asymmetric threats
    Singh, Satnam
    Donat, William
    Tu, Haiying
    Lu, Jijun
    Pattipati, Krishna
    Willett, Peter
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 3943 - +
  • [32] Are Software Updates Useless against Advanced Persistent Threats?
    Massacci, Fabio
    Di Tizio, Giorgio
    COMMUNICATIONS OF THE ACM, 2023, 66 (01) : 31 - 33
  • [33] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Baksi, Rudra P.
    Upadhyaya, Shambhu J.
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 897 - 913
  • [34] Exploring the vulnerability in the inference phase of advanced persistent threats
    Wu, Qi
    Li, Qiang
    Guo, Dong
    Meng, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (03)
  • [35] Preventing Advanced Persistent Threats in Complex Control Networks
    Rubio, Juan E.
    Alcaraz, Cristina
    Lopez, Javier
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 402 - 418
  • [36] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Rudra P. Baksi
    Shambhu J. Upadhyaya
    Information Systems Frontiers, 2021, 23 : 897 - 913
  • [37] Concept and difficulties of advanced persistent threats (APT): Survey
    Khaleefa, Eman J.
    Abdulah, Dhahair A.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 4037 - 4052
  • [38] An adaptive defense mechanism to prevent advanced persistent threats
    Xie, Yi-xi
    Ji, Li-xin
    Li, Ling-shu
    Guo, Zehua
    Baker, Thar
    CONNECTION SCIENCE, 2021, 33 (02) : 359 - 379
  • [39] Hybrid Analysis Technique to detect Advanced Persistent Threats
    Chakkaravarthy, S. Sibi
    Vaidehi, V.
    Rajesh, P.
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2018, 14 (02) : 59 - 76
  • [40] Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
    Nicho, Mathew
    Khan, Shafaq
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (01) : 1 - 18