Passer à la navigation principale Passer à la recherche Passer au contenu principal

Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

We propose a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) as a prismatic instance of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP addresses, resources, etc.), as well as information about the attacker's knowledge, motivation and capabilities. The base of the prism is represented as an n-side polygon (e.g., triangle, square, pentagon, etc.), which depicts the internal information of the system, whereas the height of the prism is represented as a single axis which depicts the external information of the system. We propose geometrical operations to determine the impact of cyber security events (i.e., area, volume, event coverage, residual risk, and potential collateral damages). A case study is proposed at the end of the paper to show the applicability of the model in a scenario with multiple attacks.

langue originaleAnglais
titreProceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
EditeurInstitute of Electrical and Electronics Engineers Inc.
Pages340-348
Nombre de pages9
ISBN (Electronique)9781509032051
Les DOIs
étatPublié - 1 janv. 2016
Modification externeOui
EvénementJoint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 - Tianjin, Chine
Durée: 23 août 201626 août 2016

Série de publications

NomProceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016

Une conférence

Une conférenceJoint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
Pays/TerritoireChine
La villeTianjin
période23/08/1626/08/16

Empreinte digitale

Examiner les sujets de recherche de « Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation