Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach

29Citations
Citations of this article
57Readers
Mendeley users who have this article in their library.

Abstract

Existing research on cyber threat assessment focuses on analyzing the network vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise networks, however, vary significantly due to not only network and system configurations, but also the attacker’s strategies. This work proposes a cyber-based attacker behavior model (ABM) in conjunction with the Cyber Attack Scenario and Network Defense Simulator to model the interaction between the network and the attackers. The ABM leverages a knowledge-based design and factors in the capability, opportunity, intent, preference, and Cyber Attack Kill Chain integration to model various types of attackers. By varying the types of attackers and the network configurations, and simulating their interactions, we present a method to measure the overall network security against cyber attackers under different scenarios. Simulation results based on four attacker types on two network configurations are shown to demonstrate how different attacker behaviors may lead to different ways to penetrate a network, and how a single misconfiguration may impact network security.

References Powered by Scopus

Dynamic security risk management using Bayesian attack graphs

528Citations
N/AReaders
Get full text

Two formal analyses of attack graphs

490Citations
N/AReaders
Get full text

Automated generation and analysis of attack graphs

445Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Simulation for cybersecurity: State of the art and future directions

42Citations
N/AReaders
Get full text

HARMer: Cyber-Attacks Automation and Evaluation

36Citations
N/AReaders
Get full text

Attack scenario reconstruction approach using attack graph and alert data mining

31Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Moskal, S., Yang, S. J., & Kuhl, M. E. (2018). Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach. Journal of Defense Modeling and Simulation, 15(1), 13–29. https://doi.org/10.1177/1548512917725408

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 24

71%

Lecturer / Post doc 4

12%

Researcher 4

12%

Professor / Associate Prof. 2

6%

Readers' Discipline

Tooltip

Computer Science 23

74%

Engineering 5

16%

Business, Management and Accounting 2

6%

Social Sciences 1

3%

Save time finding and organizing research with Mendeley

Sign up for free