Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach

2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)(2017)

引用 1|浏览4
暂无评分
摘要
It is possible that an invisible adversary can damage a physical component with the cyber-attacks such as in the Stuxnet, which plays a havoc demonstration in cyber-security. In this paper, we propose a cyber-attacks analysis model based on the Bayesian network approaches. By the construction of attack graph covering all possible atomic attacking paths, we utilize the Bayesian reasoning to deduce the success likelihood for all attacking paths and then make tracing to the most probable attack path with the Junction Tree algorithm to compute the posterior probability of a specific exploit relative to prior knowledge on attackers. Especially, vulnerability exploit possibility is quantified by weighing the environmental factors and the non-environmental factors based on cyber-attack features.
更多
查看译文
关键词
cyber-attacks,cyber-security,Bayesian network,attack graph,exploit possibility
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要