A quantifiable Attack-Defense Trees model for APT attack

被引:0
|
作者
Fei, Yu [1 ]
Ning, Jing [2 ]
Jiang, Wenbao [1 ]
机构
[1] Beijing Informat Sci & Technol, Sch Informat Management, Beijing, Peoples R China
[2] Beijing Informat Sci & Technol, Sch Econ & Management, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack-Defense Trees; Analytic hierarchy process; Network attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to deal with APT(Advanced Persistent Threat) attacks, this paper proposes a quantifiable Attack-Defense Tree model. First, the model gives both attack and defense leaf node a variety of security attributes. And then quantifies the nodes through the analytic hierarchy process. Finally, it analyzes the impact of the defense measures on the attack behavior. Through the application of the model, we can see that the quantifiable Attack-Defense Tree model can well describe the impact of defense measures on attack behavior.
引用
收藏
页码:2303 / 2306
页数:4
相关论文
共 50 条
  • [41] Cybersecurity risk assessment method of ICS based on attack-defense tree model
    Wang, Shuang
    Ding, Lei
    Sui, He
    Gu, Zhaojun
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (06) : 10475 - 10488
  • [42] Deployment Optimization of Defense Stations in an Attack-Defense Aerial War Game
    Jia, Zhi-Xiang
    Kiang, Jean-Fu
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [43] Nash equilibrium strategy and attack-defense game model for naval support base
    Zeng, Bin
    Wang, Rui
    Li, Houpu
    Zhang, Hongqiang
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (08): : 2570 - 2580
  • [44] Malware propagation model in wireless sensor networks under attack-defense confrontation
    Zhou, Haiping
    Shen, Shigen
    Liu, Jianhua
    [J]. COMPUTER COMMUNICATIONS, 2020, 162 (162) : 51 - 58
  • [45] Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
    Tan, Jing-lei
    Zhang, Heng-wei
    Zhang, Hong-qi
    Lei, Cheng
    Jin, Hui
    Li, Bo-wen
    Hu, Hao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [46] Analysis for Ad hoc network attack-defense based on stochastic game model
    [J]. 1600, International Frequency Sensor Association (173):
  • [47] Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
    Roy, Arpan
    Kim, Dong Seong
    Trivedi, Kishor S.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (08) : 929 - 943
  • [48] A two-layer game theoretical attack-defense model for a false data injection attack against power systems
    Wang, Qi
    Tai, Wei
    Tang, Yi
    Ni, Ming
    You, Shi
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 104 : 169 - 177
  • [49] Network Attack-Defense Simulation Training System Based on HLA
    Chen, Gang
    Xiang, Shang
    Ji, GuanQun
    Jia, YiLong
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER MODELING AND SIMULATION, PROCEEDINGS, 2009, : 303 - +
  • [50] Attack-defense differential game to strength allocation strategies generation
    Li, Lingwei
    Xiao, Bing
    Su, Shihong
    Zhang, Haichao
    Wu, Xiwei
    Guo, Yiming
    [J]. OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (06): : 3219 - 3236