基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
This paper presents the attack tree modeling technique of quantifying cyber-attacks on a hypothetical school network system. Attack trees are constructed by decomposing the path in the network system where attacks are plausible. Considered for the network system are two possible network attack paths. One network path represents an attack through the Internet, and the other represents an attack through the Wireless Access Points (WAPs) in the school network. The probabilities of success of the events, that is, 1) the attack payoff, and 2) the commitment of the attacker to infiltrate the network are estimated for the leaf nodes. These are used to calculate the Returns on Attacks (ROAs) at the Root Nodes. For Phase I, the “As Is” network, the ROA values for both attack paths, are higher than 7 (8.00 and 9.35 respectively), which are high values and unacceptable operationally. In Phase II, countermeasures are implemented, and the two attack trees reevaluated. The probabilities of success of the events, the attack payoff and the commitment of the attacker are then re-estimated. Also, the Returns on Attacks (ROAs) for the Root Nodes are re-assessed after executing the countermeasures. For one attack tree, the ROA value of the Root Node was reduced to 4.83 from 8.0, while, for the other attack tree, the ROA value of the Root Node changed to 3.30 from 9.35. ROA values of 4.83 and 3.30 are acceptable as they fall within the medium value range. The efficacy of this method whereby, attack trees are deployed to mitigate computer network risks, as well as using it to assess the vulnerability of computer networks is quantitatively substantiated.
推荐文章
用于网格计算的Overlay Network 设计算法的研究
网格架构
Overlay Network
拓扑结构
拉格朗日松驰
NETWORK6000系统在酸站车间的应用
集散控制
联锁控制
NETWORK6000
粘胶短纤
闪蒸
Evaluation of groundwater quality in the Dibdibba aquifer using hydrogeochemical and isotope techniq
Safwan-Zubair
Dibdibba formation
Geochemical modeling
Mixing
Stable isotopes
Basra
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
来源期刊 信息安全(英文) 学科 医学
关键词 Cyber-Attack Quantitative VULNERABILITY Assessment ATTACK Trees RETURN on ATTACK Countermeasures
年,卷(期) xxaqyw_2019,(3) 所属期刊栏目
研究方向 页码范围 103-116
页数 14页 分类号 R73
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2019(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
Cyber-Attack
Quantitative
VULNERABILITY
Assessment
ATTACK
Trees
RETURN
on
ATTACK
Countermeasures
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
信息安全(英文)
季刊
2153-1234
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
230
总下载数(次)
0
论文1v1指导