Open Access Open Access  Restricted Access Subscription or Fee Access

A Real Methodology towards Building a Attack Graph designed for Cybersecurity

Sachin Kumar

Abstract


Abstract:

 Cyberattack organization are complex and varied, and the detection and prediction of dynamic styles of attack are continually challenging tasks. Research on information graphs is turning into an increasing number of mature in lots of fields. At gift, it's far very widespread that positive students have blended the idea of the knowledge graph with cybersecurity which will assemble a cybersecurity understanding base. This paper gives a cybersecurity know-how base and deduction policies based on a quintuple model. The use of device gaining knowledge of, I extract entities and build ontology to reap a cybersecurity information base. New policies are then deduced by means of calculating formulas and the usage of the direction-ranking algorithm. The Stanford named entity recognizer (NER) is likewise used to educate an extractor to extract useful records. Experimental consequences display that the Stanford NER gives many functions and the use Papers parameter can be used to teach a recognizer inside the cybersecurity area in training for destiny paintings.

 

Keywords: Attack graph ,Cybersecurity, Cyber physical system security, NER,  Industrial control system, Vehicular networks,


Full Text:

PDF

References


References

Bishop, M., Computer Security Art and Science, Addison Wesley, pp. 343-349, 2003.

Chew, E., Clay, A., Hash, J., Bartol, N., Brown, A., Guide for Developing Performance Metrics for Information Security, NIST Special Publication 800-80, May 2006.

Chemical Sector Cyber Security Program (CSCSP), Guidance for Addressing Cyber Security in the Chemical Industry, Technical Report, CSCSP, May 2006.

Idaho National Laboratory Report to the Department of Homeland Security, INL/EXT-06-12016, Cyber Security Metrics, December 2006.

Jacquith, A., Security Metrics, Addison Wesley, 2007.

McQueen, M. A., W. F. Boyer, M. A. Flynn, G. A. Beitel, "Time-to-compromise Model for Cyber Risk Reduction Estimation", First Workshop on Quality of Protection, Sept. 2005.

McQueen, M. A., W. F. Boyer, M. A. Flynn, G. A. Beitel, "Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System", Proceedings of the 39th Hawaii International Conference on System Sciences, pp. 226, Jan. 2006.

Mell P, V Hu, R Lippmann, J Haines, and M Zissman, An Overview of Issues in Testing Intrusion Detection Systems, Interagency Report (IR) 7007, National Institute of Standards and Technology, Gaithersburg, Maryland, June 2003,

Manadhata, P., Wing, J. M., An Attack Surface Metric, Technical Report CMU-CS-05-155, July 2005

Neumann, P. G., Computer Related Risks, Addison Wesley, pp. 244, 1995.

Ou, X., Boyer, W., McQueen, M., A Scalable approach to Attack Graph Generation, 13th ACM Conference on Computer and Communications Security, CCS’06, October 30 through November 3, 2006.

Ross, R., S. Katzke, A. Johnson, M. Swanson & G. Rogers, System Questionnaire with NIST SP 800-53: Recommended Security Controls for Federal Information Systems, Technical Report, NIST, References and Associated Security Control Mappings, Gaithersburg, Maryland, March 2006,

Swanson, M., N. Bartol, J. Sabato, J. Hash & L. Graffo, NIST Special Publication 800-55: Security Metrics Guide for Information Technology Systems, Technical Report, National Institute of Standards and Technology (NIST), Gaithersburg, Maryland, July 2003

Schneier, B., Secrets & Lies, Wiley, pp. 367-380, 2000.

Schiffman, M., A Complete Guide to the Common Vulnerability Scoring System (CVSS), Technical Report, Forum for Incident Response and Security Teams (FIRST), June 7, 2005.

Swanson, M., B. Guttman, "Generally Accepted Principles and Practices for Securing Information Technology Systems", NIST 800-14, September 1996.

Summers, R. C., Secure Computing Threats and Safeguards, McGraw Hill pp. 251-252, 1997.

A Sophos Article 04.12v1.dNA, eight trends changing network security by James Lyne.

Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole

Computer Security Practices in Non Profit Organisations – A NetAction Report by Audrie Krause.

A Look back on Cyber Security 2012 by Luis corrons – Panda Labs.

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 Page nos.68 – 71 ISSN 2229-5518, “Study of Cloud Computing in HealthCare Industry “ by G.Nikhita Reddy, G.J.Ugander Reddy

IEEE Security and Privacy Magazine – IEEECS “Safety Critical Systems – Next Generation “July/ Aug 2013. 7. CIO Asia, September 3rd, H1 2013: Cyber security in malasia by Avanthi Kumar




DOI: https://doi.org/10.37628/ijece.v6i1.1344

Refbacks

  • There are currently no refbacks.