Analysis of Cyber Attack Vectors

被引:0
|
作者
Tiwari, Vijay K. [1 ]
Dwivedi, Rajeeva [2 ]
机构
[1] Minist Def, Lucknow, Uttar Pradesh, India
[2] Galgotia Inst Engn & Management, Greater Noida, Gautambudha Nag, India
关键词
Cyber Vulnerability; patching; hacker; Probability; cyber Random Space; Patch Application time; compromised employee;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current day networks operate on multiple hardware devices assisted by numerous numbers of operating systems. Systems may have vulnerabilities. These are explored and then exploited. Among the overall malicious activity countries, India ranked third after US and China. This paper has made an attempt to explore possibility of quantifying various probabilities. Cyber system can be modeled in different ways. There are various attack vectors that make cyber network vulnerable. A compromised employee is an insider to any network and contributes significantly to the network vulnerability. Keeping in mind various random variables that affect the safety of Cyber Random Space, there may be a need to quantify the probability associated with different cyber exploitation related activities.
引用
收藏
页码:600 / 604
页数:5
相关论文
共 50 条
  • [1] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [2] Hardware-based cyber threats: attack vectors and defence techniques
    Montasari, Reza
    Hill, Richard
    Parkinson, Simon
    Daneshkhah, Alireza
    Hosseinian-Far, Amin
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (04) : 397 - 411
  • [3] An Analysis of Cyber Security Attack Taxonomies
    Derbyshire, Richard
    Green, Benjamin
    Prince, Daniel
    Mauthe, Andreas
    Hutchison, David
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 153 - 161
  • [4] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [5] Cyber Attack Grammars for Risk/Cost Analysis
    Patten, Terry
    Mitchell, Daniel
    Call, Catherine
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 597 - 605
  • [6] Attack Analysis Framework for Cyber-Attack and Defense Test Platform
    Qi, Yulu
    Jiang, Rong
    Jia, Yan
    Li, Aiping
    [J]. ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [7] Breakpoints: An Analysis of Potential Hypervisor Attack Vectors
    Turnbull, Louis
    Shropshire, Jordan
    [J]. 2013 PROCEEDINGS OF IEEE SOUTHEASTCON, 2013,
  • [8] Risk Analysis of Cyber Physical Distribution Network Operation Considering Cyber Attack
    An, Yu
    Liu, Dong
    Chen, Fei
    Xu, Weiwei
    [J]. Dianwang Jishu/Power System Technology, 2019, 43 (07): : 2345 - 2352
  • [9] Towards a framework for cyber attack impact analysis of electric cyber physical systems
    Wang, Yinan
    Li, Wei
    Yan, Gangfeng
    Song, Sumian
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2017, : 638 - 643
  • [10] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678