Towards Modelling Adaptive Attacker's Behaviour

نویسندگان

  • Leanid Krautsevich
  • Fabio Martinelli
  • Artsiom Yautsiukhin
چکیده

We describe our model for the behaviour of an attacker. In the model, the attacker has uncertain knowledge about a computer system. Moreover, the attacker tries different attack paths if initially selected ones cannot be completed. The model allows finer-grain analysis of the security of computer systems. The model is based on Markov Decision Processes theory for predicting possible attacker’s decisions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Brief Announcement: Towards Modular Verification of Stabilisation in Self-adaptive Embedded Systems

We introduce a formal semantic-based modelling framework to model, specify and verify the functional and adaptive behaviour of synchronous adaptive systems.

متن کامل

Modelling Attacker's Knowledge for Cascade Cryptographic Protocols

We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocols requires precise modelling of the attacker’s knowledge. In this paper we use the event B modelling language to model the knowledge of the attacker for a class of cryptographic protocols called cascade protocols. The...

متن کامل

Errata to Crisis Stability Indices for Adaptive Two-Layer Defenses

An earlier treatment overestimated the survivability of an attacker's non-alert aircraft and hence their contribution to his first strike. This report corrects the error and discusses its impact, which is primarily important for ground-based defenses. It reduces the attacker's aircraft survival rates to about those of the defender's, improving the stability properties of spacebased defenses.

متن کامل

Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on ideali...

متن کامل

A Graph Grammar for Modelling RNA Folding

We propose a new approach for modelling the process of RNA folding as a graph transformation guided by the global value of free energy. Since the folding process evolves towards a configuration in which the free energy is minimal, the global behaviour resembles the one of a self-adaptive system. Each RNA configuration is a graph and the evolution of configurations is constrained by precise rule...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012