Modeling advanced persistent threats using risk matrix methods

被引:1
|
作者
Ivanova, Nina D. [1 ]
Ivanenko, Vitaliy G. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Dept Informat Secur, Moscow Engn Phys Inst, Moscow 115409, Russia
关键词
Advanced persistent threat; Threat model; Risk matrix models; Clustering methods;
D O I
10.1007/s11416-022-00440-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of the study is to assess the security of information systems during an influence of advanced persistent threats. The article shows the need to build a threat model during an analyzing the security of information systems. Various approaches to modeling threats in information systems are considered, their advantages and disadvantages are noted, requirements for the developed methodology are formed. As a result of the study, a method for modeling computer attack scenarios and assessing the security of information systems under the influence of advanced persistent threats is formed, based on the use of risk matrix models. A method for determining categorical variables characterizing the probability and damage as a result of the implementation of information threats using clustering methods is also proposed. The example demonstrates the use of a graph of threat matrices for modeling scenarios of targeted computer attacks on information system assets. The scientific novelty of the work consists in the proposal of a method for analyzing the security of information systems, which takes into account the possibility of changing the probability of the implementation of information threats during the life cycle of an advanced persistent threat, the dependence of information threats and the value of information assets for the intruder and their owner, which makes it possible to predict various scenarios of computer attacks.
引用
收藏
页码:367 / 372
页数:6
相关论文
共 50 条
  • [41] Developing Secure Products in the Age of Advanced Persistent Threats
    Baize, Eric
    IEEE SECURITY & PRIVACY, 2012, 10 (03) : 88 - 92
  • [42] Advanced Persistent threats and how to monitor and deter them
    Tankard C.
    Network Security, 2011, 2011 (08) : 16 - 19
  • [43] Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats
    Beuhring, Aaron
    Salous, Kyle
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 90 - 93
  • [44] APTHunter: Detecting Advanced Persistent Threats in Early Stages
    Mahmoud, Moustafa
    Mannan, Mohammad
    Youssef, Amr
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [45] The Influences of Feature Sets on the Detection of Advanced Persistent Threats
    Hofer-Schmitz, Katharina
    Kleb, Ulrike
    Stojanovic, Branka
    ELECTRONICS, 2021, 10 (06) : 1 - 22
  • [46] Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification
    Siddiqui, Sana
    Khan, Muhammad Salman
    Ferens, Ken
    Kinsner, Witold
    IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 64 - 69
  • [47] Systems for Detecting Advanced Persistent Threats a Development Roadmap using Intelligent Data Analysis
    de Vries, Johannes
    Hoogstraaten, Hans
    van den Berg, Jan
    Daskapan, Semir
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 54 - 61
  • [48] On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats
    Zhu, Quanyan
    Rass, Stefan
    IEEE ACCESS, 2018, 6 : 13958 - 13971
  • [49] Learning Games for Defending Advanced Persistent Threats in Cyber Systems
    Zhu, Tianqing
    Ye, Dayong
    Cheng, Zishuo
    Zhou, Wanlei
    Yu, Philip S.
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (04): : 2410 - 2422
  • [50] Surviving advanced persistent threats in a distributed environment - Architecture and analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (05) : 987 - 995