IDEAS home Printed from https://ideas.repec.org/a/sae/joudef/v15y2018i1p13-29.html
   My bibliography  Save this article

Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach

Author

Listed:
  • Stephen Moskal
  • Shanchieh Jay Yang
  • Michael E Kuhl

Abstract

Existing research on cyber threat assessment focuses on analyzing the network vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise networks, however, vary significantly due to not only network and system configurations, but also the attacker’s strategies. This work proposes a cyber-based attacker behavior model (ABM) in conjunction with the Cyber Attack Scenario and Network Defense Simulator to model the interaction between the network and the attackers. The ABM leverages a knowledge-based design and factors in the capability, opportunity, intent, preference, and Cyber Attack Kill Chain integration to model various types of attackers. By varying the types of attackers and the network configurations, and simulating their interactions, we present a method to measure the overall network security against cyber attackers under different scenarios. Simulation results based on four attacker types on two network configurations are shown to demonstrate how different attacker behaviors may lead to different ways to penetrate a network, and how a single misconfiguration may impact network security.

Suggested Citation

  • Stephen Moskal & Shanchieh Jay Yang & Michael E Kuhl, 2018. "Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach," The Journal of Defense Modeling and Simulation, , vol. 15(1), pages 13-29, January.
  • Handle: RePEc:sae:joudef:v:15:y:2018:i:1:p:13-29
    DOI: 10.1177/1548512917725408
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/1548512917725408
    Download Restriction: no

    File URL: https://libkey.io/10.1177/1548512917725408?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:joudef:v:15:y:2018:i:1:p:13-29. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.