A quantifiable Attack-Defense Trees model for APT attack

被引:0
|
作者
Fei, Yu [1 ]
Ning, Jing [2 ]
Jiang, Wenbao [1 ]
机构
[1] Beijing Informat Sci & Technol, Sch Informat Management, Beijing, Peoples R China
[2] Beijing Informat Sci & Technol, Sch Econ & Management, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack-Defense Trees; Analytic hierarchy process; Network attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to deal with APT(Advanced Persistent Threat) attacks, this paper proposes a quantifiable Attack-Defense Tree model. First, the model gives both attack and defense leaf node a variety of security attributes. And then quantifies the nodes through the analytic hierarchy process. Finally, it analyzes the impact of the defense measures on the attack behavior. Through the application of the model, we can see that the quantifiable Attack-Defense Tree model can well describe the impact of defense measures on attack behavior.
引用
收藏
页码:2303 / 2306
页数:4
相关论文
共 50 条
  • [1] Attack-defense trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2014, 24 (01) : 55 - 87
  • [2] Foundations of Attack-Defense Trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 80 - +
  • [3] Computational Aspects of Attack-Defense Trees
    Kordy, Barbara
    Pouly, Marc
    Schweitzer, Patrick
    [J]. SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 103 - +
  • [4] Expected Cost Analysis of Attack-Defense Trees
    Eisentraut, Julia
    Kretinsky, Jan
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 203 - 221
  • [5] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [6] Multilayered Attack-Defense Model on Networks
    Perevozchikov, A. G.
    Reshetov, V. Yu
    Yanochkin, I. E.
    [J]. COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2019, 59 (08) : 1389 - 1397
  • [7] Modelling Attack-defense Trees Using Timed Automata
    Gadyatskaya, Olga
    Hansen, Rene Rydhof
    Larsen, Kim Guldstrand
    Legay, Axel
    Olesen, Mads Chr.
    Poulsen, Danny Bogsted
    [J]. FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, FORMATS 2016, 2016, 9884 : 35 - 50
  • [8] On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Kordy, Barbara
    Widel, Wojciech
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 325 - 346
  • [9] A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
    Jhawar, Ravi
    Lounis, Karim
    Mauw, Sjouke
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 138 - 153
  • [10] An Attack-Defense Model with Inhomogeneous Resources of the Opponents
    Perevozchikov, A. G.
    Reshetov, V. Yu.
    Yanochkin, I. E.
    [J]. COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2018, 58 (01) : 38 - 47