{"title":"Formalization of Attack Prediction Problem","authors":"Pavel Yermalovich, M. Mejri","doi":"10.1109/ITMQIS.2018.8525128","DOIUrl":null,"url":null,"abstract":"The use of information is inextricably linked with its security. The presence of vulnerabilities enables a third party to breach the security of information. Threat modeling helps to identify those infrastructure areas, which would be most likely exposed to attacks. In some cases, threat modeling cannot be classified as sufficient protection method. This paper entitled \"Formalization of attack prediction problem\" presents an analysis of different techniques with an attempt to identify the most informative parameters and attack prediction markers, which would lay the foundation for the development of attack probability functions. The obtained functional dependencies should be formally verified for further testing by a real system. The findings of this research could be applied during the future assessment of information system risk levels to ensure more effective information security management.","PeriodicalId":133622,"journal":{"name":"2018 IEEE International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITMQIS.2018.8525128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The use of information is inextricably linked with its security. The presence of vulnerabilities enables a third party to breach the security of information. Threat modeling helps to identify those infrastructure areas, which would be most likely exposed to attacks. In some cases, threat modeling cannot be classified as sufficient protection method. This paper entitled "Formalization of attack prediction problem" presents an analysis of different techniques with an attempt to identify the most informative parameters and attack prediction markers, which would lay the foundation for the development of attack probability functions. The obtained functional dependencies should be formally verified for further testing by a real system. The findings of this research could be applied during the future assessment of information system risk levels to ensure more effective information security management.