2015 APWG Symposium on Electronic Crime Research (eCrime) 2015
DOI: 10.1109/ecrime.2015.7120797
|View full text |Cite
|
Sign up to set email alerts
|

Global adversarial capability modeling

Abstract: Intro: Computer network defense has models for attacks and incidents comprised of multiple attacks after the fact. However, we lack an evidence-based model the likelihood and intensity of attacks and incidents.Purpose: We propose a model of global capability advancement, the adversarial capability chain (ACC), to fit this need. The model enables cyber risk analysis to better understand the costs for an adversary to attack a system, which directly influences the cost to defend it. Method: The model is based on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 9 publications
(8 reference statements)
0
4
0
Order By: Relevance
“…MITRE Corporation [126] on whether cybersecurity is a science is not within our current, relatively narrow scope. However, since CSIR is an important subset of cybersecurity, whether security investigations are a kind 23 As a convenient sample, one of the authors has presented at Anti-Phishing Working Group (APWG) [161,164] and attended InfraGuard meetings, and does not expect there would be significant benefit in expanding the scope to include them. Likewise, the same author has interacted with several Information Sharing and Analysis Centers (ISACs), and reviewed their available materials (Research and Education Networking ISAC (REN-ISAC) and Financial Services ISAC (FS-ISAC) especially) and does not believe they have any documents of importance to our topic.…”
Section: Documents Referenced By First As Tablementioning
confidence: 99%
“…MITRE Corporation [126] on whether cybersecurity is a science is not within our current, relatively narrow scope. However, since CSIR is an important subset of cybersecurity, whether security investigations are a kind 23 As a convenient sample, one of the authors has presented at Anti-Phishing Working Group (APWG) [161,164] and attended InfraGuard meetings, and does not expect there would be significant benefit in expanding the scope to include them. Likewise, the same author has interacted with several Information Sharing and Analysis Centers (ISACs), and reviewed their available materials (Research and Education Networking ISAC (REN-ISAC) and Financial Services ISAC (FS-ISAC) especially) and does not believe they have any documents of importance to our topic.…”
Section: Documents Referenced By First As Tablementioning
confidence: 99%
“…One example cited by respondents is malware attacks to ATMs, and another case recently reported by the international press is malware attack to conduct fraud by using the SWIFT network [39]. These two cases as well as the ongoing global development of adversarial cyber capabilities [40] suggest that the Ecuadorian financial sector necessitates preparation for even more aggressive attacks than those confronted so far. As part of such an endeavor, financial institutions could benefit from applying models such as the "adversarial capability chain" to support prediction of threats' movements and their proficiencies [40].…”
Section: Externalitiesmentioning
confidence: 99%
“…Lockheed Martin's cyber kill chain (CKC) allows us to recognize the stages taken by advanced adversaries' during cyber intrusions and helps identify discrete attacks connected to intrusive campaigns [92]. The "global adversarial capability chain model" intends to expand the time-frame in which security analysts can investigate and predict adversaries behavior against a particular software system [40]. The diamond model for intrusion analysis [93] identifies and analyzes granular, essential elements (e.g.…”
Section: Information Sharing Programmentioning
confidence: 99%
“…As a convenient sample, I have presented at APWG(Spring, 2013;Spring et al, 2015) and attended InfraGuard meetings, and I do not expect there would be significant benefit in expanding the scope to include them. Likewise, I have interacted with several ISACs, and reviewed their available materials (Research and Education Networking Information Sharing and Analysis Center (ISAC) (REN-ISAC) and Financial Services Information Sharing and Analysis Center (ISAC) (FS-ISAC) especially) and do not believe they have any documents of importance to our topic.…”
mentioning
confidence: 99%