Modeling active cyber attack for network vulnerability assessment

被引:0
|
作者
Eom, Jung-Ho [1 ]
Han, Young-Ju [1 ]
Chung, Tai-Myoung [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Internet Management Technol Lab, 300 Cheoncheon Dong, Suwon 440746, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we considered active cyber attack model to assess vulnerability in network system. As we simulate cyber attack model in the network system, we can identify vulnerabilities, and provide appropriate countermeasures against them. Our model consists of two agents, two modules, and action controller on on-line system, and attack damage assessment analyzer on off-line system. We can minimize a detection probability from target system because we applied 'Sensor to Shooter' concept to our model, and separated information collection agent and attack agent for reduce attack action time. One module analyzes target system's information. Another module develops target system and main point of impact, and builds attack scenario consisted of attack tree and attack pattern. Attack action agents execute the set of attack sequence which consists of attack pattern in attack tree's each node. Action controller controls all execution process of our model's elements.
引用
收藏
页码:971 / +
页数:2
相关论文
共 50 条
  • [21] Cyber-Physical Modeling and Vulnerability Assessment of Substations for Transmission System Operator
    Shashank, S.
    Gurrala, Gurunath
    Sastry, P. S.
    Katewa, Vaibhav
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2024, 235
  • [22] SCADA modeling for performance and vulnerability assessment of integrated cyber-physical systems
    Stefanov, Alexandru
    Liu, Chen-Ching
    Govindarasu, Manimaran
    Wu, Shinn-Shyan
    [J]. INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2015, 25 (03): : 498 - 519
  • [23] Control System Modeling in Early-Stage Simulation for Cyber Vulnerability Assessment
    Flath, Allen W., III
    Cramer, Aaron M.
    Liu, Xiao
    [J]. 2017 IEEE ELECTRIC SHIP TECHNOLOGIES SYMPOSIUM (ESTS), 2017, : 9 - 15
  • [24] An Active Distributed Approach for Cyber Attack Detection
    Hoa Dinh Nguyen
    Gutta, Sandeep
    Cheng, Qi
    [J]. 2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 1540 - 1544
  • [25] Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System
    Doynikova, Elena
    Chechulin, Andrey
    Kotenko, Igor
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 53 - 61
  • [26] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [28] Development of Cyber Attack Model for Private Network
    Al-Amin, Mostafa
    Khatun, Mirza Akhi
    Nasir Uddin, Mohammed
    [J]. Proceedings - 2022 2nd International Conference on Interdisciplinary Cyber Physical Systems, ICPS 2022, 2022, : 216 - 221
  • [29] Cyber security vulnerability assessment of power industry
    Yu, Jiaxi
    Mao, Anjia
    Guo, Zhizhong
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1379 - +
  • [30] Cyber Security Vulnerability Assessment for Smart Substations
    Chai Jiwen
    Liu Shanmei
    [J]. 2016 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2016, : 1368 - 1373