Evaluating threat assessment for multi-stage cyber attacks

被引:0
|
作者
Yang, Shanchieh Jay [1 ]
Holsopple, Jared [2 ]
Sudit, Moises [3 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
[2] CUBRC, Buffalo, NY USA
[3] Univ Buffalo, CMIF, Buffalo, NY USA
来源
MILCOM 2006, VOLS 1-7 | 2006年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Current practices to defend against cyber attacks are typically reactive yet passive. Recent research work has been proposed to proactively predict hacker's target entities in the early stage of the attack. With prediction, there comes false alarms and missed attacks. Very little has been reported on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment algorithm is, perhaps more susceptible that for other application domains. This work sets forth the issues on evaluating cyber threat assessment algorithms, and discusses the validity of various statistical measures. Simulation examples are provided to illustrate the pros and cons of using different metrics under various cyber attack scenarios. Our results show that commonly used false positives and false negatives are necessary but not sufficient to evaluate cyber threat assessment.
引用
收藏
页码:1287 / +
页数:2
相关论文
共 50 条
  • [1] Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems
    Zimba, Aaron
    Wang, Zhaoshun
    Chen, Hongsong
    ICT EXPRESS, 2018, 4 (01): : 14 - 18
  • [2] Analysing a multi-stage cyber threat and its impact on the power system
    Al Homoud, Leen
    Barpanda, Namrata
    Bobato, Vinicius
    Goulart, Ana
    Davis, Kate
    Rice, Mark
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2025, 10 (01)
  • [3] Cyber-attacks visualisation and prediction in complex multi-stage network
    Mishra, Shailendra
    Alotaibi, Waleed Bander
    Alshehri, Mohammed
    Saxena, Sharad
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (04) : 345 - 356
  • [4] Intrusion damage assessment for multi-stage attacks for clouds
    Arshad, Junaid
    Azad, Muhammad Ajmal
    Jokhio, Imran Ali
    Townend, Paul
    IET COMMUNICATIONS, 2013, 7 (12) : 1304 - 1315
  • [5] Intrusion Damage Assessment for Multi-stage Attacks for Clouds
    Arshad, Junaid
    Jokhio, Imran Ali
    Shah, Mahmood
    EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 132 - +
  • [6] Robustness assessment of weakly coupled cyber-physical power systems under multi-stage attacks
    Chen, Lingjuan
    Wang, Bin
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 231
  • [7] On using contextual correlation to detect multi-stage cyber attacks in smart grids
    Sen, Oemer
    van der Velde, Dennis
    Wehrmeister, Katharina A.
    Hacker, Immanuel
    Henze, Martin
    Andres, Michael
    SUSTAINABLE ENERGY GRIDS & NETWORKS, 2022, 32
  • [8] Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids
    Sen, Oemer
    van der Velde, Dennis
    Wehrmeister, Katharina A.
    Hacker, Immanuel
    Henze, Martin
    Andres, Michael
    2021 INTERNATIONAL CONFERENCE ON SMART ENERGY SYSTEMS AND TECHNOLOGIES (SEST), 2021,
  • [9] Modeling and reconstruction of multi-stage attacks
    Rubinshtein, Sergey
    Puzis, Rami
    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SCIENCE, TECHNOLOGY AND ENGINEERING (SWSTE 2016), 2016, : 135 - 137
  • [10] Analysis and modelling of multi-stage attacks
    Chamotra, Saurabh
    Barbhuiya, Ferdous Ahmed
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1269 - 1276