Article

Article title DEVELOPMENT OF NETWORK ATTACK MODELING METHOD BASED ON NEURAL NETWORKS AND PROBABILISTIC GRAPHS
Authors E.P. Tumoyan
Section SECTION IV. TECHNOLOGIES OF SAFETY
Month, Year 01, 2009 @en
Index UDC 681.3.053:681.32
DOI
Abstract In this paper, we proposed new formal model for network attack representation based on artificial neural networks and automata with probabilistic transition functions. A theoretical justification of the proposed method is given in terms of graph theory. The proposed method allows simulating network attacks in real computer systems.

Download PDF

Keywords Attack modeling; attack stage; theoretical attacking system; state clusters.
References 1. Schneier B. Attack Trees // Dr. Dobb's Journal. 1999. URL:
http://www.schneier.com/paper-attacktrees-ddj-ft.html (дата обращения: 20.12.2009).
2. Camtepe S.A. A Formal Method for Attack Modeling and Detection / S.A. Camtepe, B. Yener // TR-06-01, Rensselaer Polytechnic Institute, Computer Science Department. 2006. URL: http://citeseer.ist.psu.edu/ 751069.html (дата обращения: 20.12.2009).
3. Sheyner O., Automated Generation and Analysis of Attack Graphs / O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing // Proceedings of the IEEE Symposium on Security and Privacy. – Oakland, USA, 2002. – P. 273–284.
4. Jha S., Sheyner O., Wing J. Two Formal Analyses of Attack Graphs /// Proceedings of the 15th IEEE Computer Security Foundations Workshop. Nova Scotia, Canada, June 2002. – P. 49-63.
5. Sheyner O. AttackGraph Tool 0.5 [Электронный ресурс]. – Режим доступа: http://www.cs.cmu.edu/~odobzins/scenariograph/ as_files/AttackGraph-0.5.tar.gz (дата обращения: 20.12.2009).
6. Von Ohiemb D., Lotz V., Gollmann D., Gьnter K., Waidner M. Formal security analysis with Interacting state machines // Lectute Notes in Computer Science. – 2002. – № 2502. – P. 212-228.
7. Хопкрофт Д., Мотивани Р., Ульман Д. Введение в теорию автоматов, языков и вычислений. – М.: Издательский дом «Вильямс», 2002. – 528 с.
8. Rieke R. Tool based formal Modelling, Analysis and Visualisation of Enterprise Network Vulnerabilities utilizing Attack Graph Exploration [Электронный ресурс]// EICAR 2004 Conference CD-ROM: Best Paper Proceedings.
9. Poggio T., Girosi F.A theory of networks for approximation and learning [Электронный ресурс]. – Режим доступа: ftp://publications.ai.mit.edu/ai-publications/1000-1499/AIM-
1140.ps.Z (дата обращения: 20.12.2009).
10. Хайкин С. Нейронные сети: полный курс. – М.: Издательский дом «Вильямс», 2006. – 1104 с.

Comments are closed.