An n-sided polygonal model to calculate the impact of cyber security events

This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP addresses, communication protocols, physical and logical resources, etc.). Every axis is composed of entities that contribute to the execution of the security event. Each entity has an associated weighting factor that measures its contribution using a multi-criteria methodology named CARVER. The graphical representation of cyber events is depicted as straight lines (one dimension) or polygons (two or more dimensions). Geometrical operations are used to compute the size (i.e, length, perimeter, surface area) and thus the impact of each event. As a result, it is possible to identify and compare the magnitude of cyber events. A case study with multiple security events is presented as an illustration on how the model is built and computed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/21/2018

The Sounds of Cyber Threats

The Internet enables users to access vast resources, but it can also exp...
research
11/13/2017

A Case Study of the 2016 Korean Cyber Command Compromise

On October 2016 the South Korean cyber military unit was the victim of a...
research
07/12/2019

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

We present a new machine learning and text information extraction approa...
research
06/21/2023

Decisions Disruptions 2: Decide Harder

Cyber incident response is critical to business continuity – we describe...
research
06/19/2023

Cyber Key Terrain Identification Using Adjusted PageRank Centrality

The cyber terrain contains devices, network services, cyber personas, an...
research
04/22/2021

Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic

In the scenarios of specific conditions and crises such as the coronavir...
research
09/29/2021

Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks

Nowadays, targeted attacks like Advanced Persistent Threats (APTs) has b...

Please sign up or login with your details

Forgot password? Click here to reset