Modeling active cyber attack for network vulnerability assessment

被引:0
|
作者
Eom, Jung-Ho [1 ]
Han, Young-Ju [1 ]
Chung, Tai-Myoung [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Internet Management Technol Lab, 300 Cheoncheon Dong, Suwon 440746, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we considered active cyber attack model to assess vulnerability in network system. As we simulate cyber attack model in the network system, we can identify vulnerabilities, and provide appropriate countermeasures against them. Our model consists of two agents, two modules, and action controller on on-line system, and attack damage assessment analyzer on off-line system. We can minimize a detection probability from target system because we applied 'Sensor to Shooter' concept to our model, and separated information collection agent and attack agent for reduce attack action time. One module analyzes target system's information. Another module develops target system and main point of impact, and builds attack scenario consisted of attack tree and attack pattern. Attack action agents execute the set of attack sequence which consists of attack pattern in attack tree's each node. Action controller controls all execution process of our model's elements.
引用
收藏
页码:971 / +
页数:2
相关论文
共 50 条
  • [1] Active cyber attack model for network system's vulnerability assessment
    Eom, Jung-ho
    Han, Young-Ju
    Park, Seon-Ho
    Chung, Tai-Myoung
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 153 - +
  • [2] Vulnerability Assessment for Communication Network of Substation Automation Systems to Cyber Attack
    Liu, Nian
    Zhang, Jianhua
    Zhang, Hao
    Liu, Wenxia
    [J]. 2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 1680 - +
  • [3] Ranking Cyber Attack Vulnerability of Nodes in Power Transmission Network
    Arif, Shaila
    Rabbi, Ata E.
    Aziz, Tareq
    [J]. 2020 INTERNATIONAL CONFERENCE ON SMART GRIDS AND ENERGY SYSTEMS (SGES 2020), 2020, : 419 - 424
  • [4] A Cyber Attack Modeling and Impact Assessment Framework
    Kotenko, Igor
    Chechulin, Andrey
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [5] MTD Assessment Framework with Cyber Attack Modeling
    Van Leeuwen, Brian
    Stout, William
    Urias, Vincent
    [J]. 2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 316 - 323
  • [6] Electric power cyber-physical systems vulnerability assessment under cyber attack
    Qu, Zhengwei
    Sun, Wenting
    Dong, Jie
    Zhao, Jianjun
    Li, Yang
    [J]. FRONTIERS IN ENERGY RESEARCH, 2023, 10
  • [7] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [8] A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions
    Binyamini, Hodaya
    Bitton, Ron
    Elovici, Yuval
    Shabtai, Asaf
    Inokuchi, Masaki
    Yagyu, Tomohiko
    [J]. KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2574 - 2583
  • [9] Network security modeling and cyber attack simulation methodology
    Chi, SD
    Park, JS
    Jung, KC
    Lee, JS
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 320 - 333
  • [10] Cyber attack modeling and simulation for network security analysis
    Kuhl, Michael E.
    Kistner, Jason
    Costantini, Kevin
    Sudit, Moises
    [J]. PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +