Title: Intruder model for generating attack scenarios in computer systems

Authors: Lamia Hamza

Addresses: Laboratoire d'Informatique Médicale, Faculté des Sciences Exactes, Université de Bejaia, 06000 Bejaia, Algeria

Abstract: In this paper, a new technique for automatic generation of complex intruder attacks is proposed. In this approach, the generation of attack scenarios is guided by an intruder strategy. Thus, only attack scenarios achieving the intruder objectives are generated. Therefore, the generated attack graph do not contain redundant nodes or edges, and enables a network administrator to have a better visualisation and apprehension of different attack scenarios for a computer network. In this way, our approach is made as a candidate for increasing accuracy of the attack graph generated based on the use of the intruder strategy.

Keywords: computer security; network; vulnerability; intruder; modelling; attack scenarios; formal technique; attack graph.

DOI: 10.1504/IJICS.2020.109486

International Journal of Information and Computer Security, 2020 Vol.13 No.3/4, pp.428 - 443

Received: 08 Apr 2019
Accepted: 07 Aug 2019

Published online: 06 May 2020 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article