IDEAS home Printed from https://ideas.repec.org/a/eme/prrpps/prr-04-2017-0024.html
   My bibliography  Save this article

On properties of cyberattacks and their nuances

Author

Listed:
  • Jassim Happa
  • Michael Goldsmith

Abstract

Purpose - Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach - This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings - The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications - This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value - The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.

Suggested Citation

  • Jassim Happa & Michael Goldsmith, 2017. "On properties of cyberattacks and their nuances," PSU Research Review, Emerald Group Publishing Limited, vol. 1(2), pages 76-90, August.
  • Handle: RePEc:eme:prrpps:prr-04-2017-0024
    DOI: 10.1108/PRR-04-2017-0024
    as

    Download full text from publisher

    File URL: https://www.emerald.com/insight/content/doi/10.1108/PRR-04-2017-0024/full/html?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: no

    File URL: https://www.emerald.com/insight/content/doi/10.1108/PRR-04-2017-0024/full/pdf?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: no

    File URL: https://libkey.io/10.1108/PRR-04-2017-0024?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    Attack models; Cyberattacks;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eme:prrpps:prr-04-2017-0024. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Emerald Support (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.