Abstract
To avoid improper responses against attacks, current systems rely on Attack Likelihood metric. Referring to NIST, Attack Likelihood considers: the attack’s complexity, the attackers’ motivation, and potential responses. Previous work on Likelihood assessment are limited to individual attacks, missing thereby coordination and concurrency aspects between attackers. Moreover, they do not fulfill all NIST factors. Hence, we propose in this paper a new framework to properly assess the Likelihood of Individual, Coordinated, and Concurrent Attack Scenarios (LICCAS). We are first based on a coordination aware-Game Theoric approach to derive an Attack Likelihood equation. Then, we propose an algorithm to assess the Scenario Likelihood of each attack scenario, considering the concurrency between attackers. We finally experiment LICCAS on a VoIP use case to demonstrate its relevance.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
References
Braynov, S., Jadliwala, M.: Representation and analysis of coordinated attacks. In: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, FMSE 2003, NY, USA, pp. 43–51 (2003)
Samarji, L., Cuppens, F., Cuppens-Boulahia, N., Kanoun, W., Dubus, S.: Situation calculus and graph based defensive modeling of simultaneous attacks. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 132–150. Springer, Heidelberg (2013)
Alpcan, T., Başar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceeding of the 42nd IEEE Conference on Decision and Control, Maui, HI, pp. 2595–2600, December 2003
Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, GameNets 2006, NY, USA. ACM (2006)
Kanoun, W., Cuppens-Boulahia, T., Cuppens, F., Dubus, S., Martin, A.: Success likelihood of ongoing attacks for intrusion detection and response systems. In: Proceedings IEEE CSE 2009, 12th IEEE International Conference on Computational Science and Engineering, Vancouver, Canada. IEEE Computer Society (2009)
Zhu, Q., Tembine, H., Basar, T.: Network security configurations: a nonzero-sum stochastic game approach. In: American Control Conference (ACC) 2010, pp. 1059–1064 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Samarji, L., Cuppens-Boulahia, N., Cuppens, F., Papillon, S., Kanoun, W., Dubus, S. (2015). Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-319-23829-6_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-23829-6_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23828-9
Online ISBN: 978-3-319-23829-6
eBook Packages: Computer ScienceComputer Science (R0)