z-logo
open-access-imgOpen Access
Determination of features of cyber-attack goals based on analysis of data in open security data sources
Author(s) -
Elena Doynikova,
Andrey Fedorchenko,
Rodion Kryukov
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/734/1/012160
Subject(s) - computer science , schema (genetic algorithms) , computer security , vulnerability (computing) , cyber attack , attack patterns , dependency (uml) , information retrieval , intrusion detection system , artificial intelligence
The paper analyzes security databases including attack patterns database, vulnerability database and weaknesses database. Special attention is given to the schema that underlies the attack patterns database and specifies its objects and relations between them. This scheme is used for selection of features that characterize different classes of cyber-attack goals. The paper outlines metrics of security related objects, such as attacks, weaknesses and vulnerabilities provided by different schemas, the classes of cyber-attack goals, and analyzes relations between different goals and features of cyber-attacks. The experiments demonstrated dependency between the values of selected features and their applicability for determination of different classes of cyber-attack goals.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here