Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We propose a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) as a prismatic instance of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP addresses, resources, etc.), as well as information about the attacker's knowledge, motivation and capabilities. The base of the prism is represented as an n-side polygon (e.g., triangle, square, pentagon, etc.), which depicts the internal information of the system, whereas the height of the prism is represented as a single axis which depicts the external information of the system. We propose geometrical operations to determine the impact of cyber security events (i.e., area, volume, event coverage, residual risk, and potential collateral damages). A case study is proposed at the end of the paper to show the applicability of the model in a scenario with multiple attacks.

Original languageEnglish
Title of host publicationProceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages340-348
Number of pages9
ISBN (Electronic)9781509032051
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
EventJoint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 - Tianjin, China
Duration: 23 Aug 201626 Aug 2016

Publication series

NameProceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016

Conference

ConferenceJoint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
Country/TerritoryChina
CityTianjin
Period23/08/1626/08/16

Fingerprint

Dive into the research topics of 'Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms'. Together they form a unique fingerprint.

Cite this