A quantitative model of the security intrusion process based on attacker behavior
- 1 April 1997
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. 23 (4) , 235-245
- https://doi.org/10.1109/32.588541
Abstract
This paper is based on a conceptual framework in which security can be split into two generic types of characteristics, behavioral and preventive. Here, preventive security denotes the system's ability to protect itself from external attacks. One way to describe the preventive security of a system is in terms of its interaction with the alleged attacker, i.e., by describing the intrusion process. To our knowledge, very little is done to model this process in quantitative terms. Therefore, based on empirical data collected from intrusion experiments, we have worked out a hypothesis on typical attacker behavior. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase, and the innovative attack phase. The probability for successful attacks during the learning and innovative phases is expected to be small, although for different reasons. During the standard attack phase it is expected to be considerably higher. The collected data indicates that the breaches during the standard attack phase are statistically equivalent and that the times between breaches are exponentially distributed. This would actually imply that traditional methods for reliability modeling could be applicable.Keywords
This publication has 9 references indexed in Scilit:
- On the modelling of preventive security based on a PC network intrusion experimentPublished by Springer Nature ,2005
- An empirical model of the security intrusion processPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On the quantitative assessment of behavioural securityPublished by Springer Nature ,1996
- Towards Operational Measures of Computer Security: Experimentation and ModellingPublished by Springer Nature ,1995
- Towards Operational Measures of Computer Security: ConceptsPublished by Springer Nature ,1995
- Questions and Answers about Tiger TeamsEDPACS, 1989
- Make the tigers hunt for youComputers & Security, 1988
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987
- Penetrating an operating system: a study of VM/370 integrityIBM Systems Journal, 1976