Building Computer Network Attacks

06/09/2010
by   Ariel Futoransky, et al.
0

In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2013

Automated Attack Planning

Penetration Testing is a methodology for assessing network security, by ...
research
04/05/2019

Efficient attack countermeasure selection accounting for recovery and action costs

The losses arising from a system being hit by cyber attacks can be stagg...
research
06/17/2013

An Algorithm to Find Optimal Attack Paths in Nondeterministic Scenarios

As penetration testing frameworks have evolved and have become more comp...
research
08/30/2022

Survey on Architectural Attacks: A Unified Classification and Attack Model

According to the World Economic Forum, cyber attacks are considered as o...
research
05/16/2019

Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs

An Intrusion Detection System (IDS) to secure computer networks reports ...
research
07/30/2013

Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration

Penetration Testing is a methodology for assessing network security, by ...
research
07/20/2022

Illusionary Attacks on Sequential Decision Makers and Countermeasures

Autonomous intelligent agents deployed to the real-world need to be robu...

Please sign up or login with your details

Forgot password? Click here to reset