2015 3rd International Conference on Future Internet of Things and Cloud 2015
DOI: 10.1109/ficloud.2015.39
|View full text |Cite
|
Sign up to set email alerts
|

A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation

Abstract: Abstract-Measuring the attack damage cost and monitoring the sequence of privilege escalations play a critical role in choosing the right countermeasure by Intrusion Response System (IRS). The existing attack damage cost evaluation approaches inherit some limitations, such as neglecting the dependencies between system assets, ignoring the backward damage of exploited non-goal services, or omitting the potential damage toward the goal service. In this paper, we propose a defense-centric model to calculate the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In addition, by utilizing the characteristics of the tree structure, studies have adopted algebraic analysis methods for calculating ADTree's quantitative properties. For example, the authors of [30] applied the ADTree to accurately calculate the damage cost of multistep attacks, measure the propagation of attack damage in the network, and choose appropriate countermeasures for minimizing the impact of attacks on services. For the multiparameter optimization of ADTrees, the authors of [31] designed automation techniques for optimizing all parameters.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, by utilizing the characteristics of the tree structure, studies have adopted algebraic analysis methods for calculating ADTree's quantitative properties. For example, the authors of [30] applied the ADTree to accurately calculate the damage cost of multistep attacks, measure the propagation of attack damage in the network, and choose appropriate countermeasures for minimizing the impact of attacks on services. For the multiparameter optimization of ADTrees, the authors of [31] designed automation techniques for optimizing all parameters.…”
Section: Related Workmentioning
confidence: 99%
“…To address this issue, we propose an ADTree structure called A2DTree. Based on this [30][31][32] new modeling technology, the minimum defense cost of the system can be easily calculated via algebraic methods. In this section, we first formally define A2DTree.…”
Section: Atom Attack Defense Treementioning
confidence: 99%