Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks

作者: Léa Samarji , Nora Cuppens-Boulahia , Frédéric Cuppens , Serge Papillon , Wael Kanoun

DOI: 10.1007/978-3-319-23829-6_37

关键词:

摘要: To avoid improper responses against attacks, current systems rely on Attack Likelihood metric. Referring to NIST, considers: the attack’s complexity, attackers’ motivation, and potential responses. Previous work assessment are limited individual missing thereby coordination concurrency aspects between attackers. Moreover, they do not fulfill all NIST factors. Hence, we propose in this paper a new framework properly assess of Individual, Coordinated, Concurrent Scenarios (LICCAS). We first based aware-Game Theoric approach derive an equation. Then, algorithm Scenario each attack scenario, considering finally experiment LICCAS VoIP use case demonstrate its relevance.

参考文章(6)
Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus, Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks International Symposium on Cyberspace Safety and Security. pp. 132- 150 ,(2013) , 10.1007/978-3-319-03584-0_11
Tansu Alpcan, Tamer Basar, A game theoretic approach to decision and analysis in network intrusion detection conference on decision and control. ,vol. 3, pp. 2595- 2600 ,(2003) , 10.1109/CDC.2003.1273013
Yu Liu, Cristina Comaniciu, Hong Man, A Bayesian game approach for intrusion detection in wireless ad hoc networks Proceeding from the 2006 workshop on Game theory for communications and networks. pp. 4- ,(2006) , 10.1145/1190195.1190198
Quanyan Zhu, H Tembine, T Basar, Network Security Configurations: A Nonzero-Sum Stochastic Game Approach advances in computing and communications. pp. 1059- 1064 ,(2010) , 10.1109/ACC.2010.5530765
Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin, Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems 2009 International Conference on Computational Science and Engineering. ,vol. 3, pp. 83- 91 ,(2009) , 10.1109/CSE.2009.233
Sviatoslav Braynov, Murtuza Jadiwala, Representation and analysis of coordinated attacks formal methods in security engineering. pp. 43- 51 ,(2003) , 10.1145/1035429.1035434