Synthesizing Perception Based on Analysis of Cyber Attack Environments

被引:0
|
作者
Sunny, Sherin [1 ]
Pavithran, Vipin [1 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Ctr Cyber Secur Syst & Networks, Kollam, India
关键词
Cyber situational awreness; Analytic Hierarchy Process; Framework; Hacking; Vulnerability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Analysing cyber attack environments yield tremendous insight into adversory behavior, their strategy and capabilities. Designing cyber intensive games that promote offensive and defensive activities to capture or protect assets assist in the understanding of cyber situational awareness. There exists tangible metrics to characterizing games such as CTFs to resolve the intensity and aggresion of a cyber attack. This paper synthesizes the characteristics of InCTF (India CTF) and provides an understanding of the types of vulnerabilities that have the potential to cause significant damage by trained hackers. The two metrics i.e. toxicity and effectiveness and its relation to the final performance of each team is detailed in this context.
引用
收藏
页码:2027 / 2030
页数:4
相关论文
共 50 条
  • [1] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01) : 260 - 280
  • [2] Cyber attack models for smart grid environments
    Eder-Neuhauser, Peter
    Zseby, Tanja
    Fabini, Joachim
    Vormayr, Gernot
    [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2017, 12 : 10 - 29
  • [3] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [4] Analysis of Cyber Attack Vectors
    Tiwari, Vijay K.
    Dwivedi, Rajeeva
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 600 - 604
  • [5] An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception
    Lallie, Harjinder Singh
    Debattista, Kurt
    Bal, Jay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1110 - 1122
  • [6] An Analysis of Cyber Security Attack Taxonomies
    Derbyshire, Richard
    Green, Benjamin
    Prince, Daniel
    Mauthe, Andreas
    Hutchison, David
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 153 - 161
  • [7] Attack-Defense Trees based Cyber Security Analysis for CPSs
    Ji, Xiang
    Yu, HuiQun
    Fan, GuiSheng
    Fu, WenHao
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 693 - 698
  • [8] Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence
    Li, Qiang
    Yang, Zeming
    Jiang, Zhengwei
    Liu, Baoxu
    Fu, Yuxia
    [J]. PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 222 - 230
  • [9] Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection
    Khosravi, Mehran
    Ladani, Behrouz Tork
    [J]. IEEE ACCESS, 2020, 8 : 162642 - 162656
  • [10] Cyber Attack Grammars for Risk/Cost Analysis
    Patten, Terry
    Mitchell, Daniel
    Call, Catherine
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 597 - 605