Article

Article title PROBABILISTIC AUTOMATA BASED COMPUTER ATTACK MODELING APPROACH
Authors Tumoyan E. P.
Section SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Month, Year 08, 2008 @en
Index UDC 681.3.053:681.32
DOI
Abstract In this paper we propose new approach to formal computer attacks modeling based on probabilistic automata. This model allows to evaluate complex transition functions and complex output functions. Output functions evaluation is based on Radial Basis Function Networks and shared memory model. Also we propose multilayer perceptrons approximation of output function. We suggest that proposed model allows to simulate real system.

Download PDF

Keywords Computer attack modeling, probalistic automata, artificial neural networks.
References 1. Schneier B. Attack Trees [Электронный ресурс] /Brus Schneier // Dr. Dobb's Journal, 1999. Режим доступа: http://www.schneier.com/paper-attacktrees-ddj-ft.html.
2. Camtepe, S.A. A Formal Method for Attack Modeling and Detection [Электронный ресурс] /Seyit Ahmet Camtepe, Bulent Yener // TR-06-01, Rensselaer Polytechnic Institute, Computer Science Department. 2006. Режим доступа: http://citeseer.ist.psu.edu/751069.html.
3. Sheyner, O. Automated Generation and Analysis of Attack Graphs /Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing // Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, 2002. P. 273 – 284.
4. Jha, S. Two Formal Analyses of Attack Graphs /S. Jha , O. Sheyner, J. Wing// Proceedings of the 15th IEEE Computer Security Foundations Workshop. Nova Scotia, Canada, June 2002. P. 49-63.
5. Sheyner, O. AttackGraph Tool 0.5 [Электронный ресурс]. Режим доступа: http://www.cs.cmu.edu/~odobzins/scenariograph/as_files/AttackGraph-0.5.tar.gz
6. Von Ohiemb, D. Formal security analysis with Interacting state machines /David Von Ohiemb, Volkmar Lotz, Dieter Gollmann, Karjoth Gьnter, Michael Waidner// Lectute Neotes in Computer Science, 2002, № 2502. P. 212-228.
7. Хопкрофт Д. Введение в теорию автоматов, языков и вычислений / Д. Хопкрофт, Р. Мотивани, Д. Ульман // 2-е издание. – М.: Издательский дом «Вильямс», 2002. – 528 с.
8 Rieke R. Tool based formal Modelling, Analysis and Visualisation of Enterprise Network Vulnerabilities utilising Attack Graph Exploration [Электронный ресурс]/ Roland Rieke// In U.E. Gattiker (Ed.), EICAR 2004 Conference CD-rom: Best Paper Proceedings (ISBN:87-987271-6-8). 31 pages. Copenhagen: EICAR e.V.
9. Poggio, T. A theory of networks for approximation and learning /Poggio, T. Girosi, F.// Technical Report A.I. Memo 1140, Massachusetts Institute of Technology, Artificial Intelligence
Laboratory and Center for Biological Information Processing, Whitaker College.
11. M. H. Stone (1937). Applications of the Theory of Boolean Rings to General Topology. Transactions of the American Mathematical Society 41 (3), 375–481.

Comments are closed.