Abstract
Cyber threat analysis is crucial to securing modern IT systems. In the ongoing project described here a strictly mathematical method for threat analysis is sketched. The threat landscape between an attacker (hacker) and a defender (system owner) is modeled along the formalisms of stochastic game theory, thus opening the way for a rigorous formal analysis. The key benefit of the project is its applicability to real-world situations. Therefore, the information about possible attack and defense actions is taken from several proven data sources resulting in a large number of actions (173 attack actions and 115 defense actions). We present an adaptation of the so-called Princess-and-Monster game to model the problem. Various problems with the formalization are discussed. To keep the model manageable despite the claim of practicality, it is applied only to specific scenarios mimicking real-world situations.
Original language | English |
---|---|
Title of host publication | Proceedings of the 9th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP |
Place of Publication | Cham |
Publisher | Springer |
Pages | 706-713 |
ISBN (Electronic) | 978-989-758-624-8 |
DOIs | |
Publication status | Published - 2023 |
Austrian Fields of Science 2012
- 202043 Network security
Keywords
- Cyber Threat Analysis, Game Theory