Authors: Lamia Hamza
Addresses: Laboratoire d'Informatique Médicale, Faculté des Sciences Exactes, Université de Bejaia, 06000 Bejaia, Algeria
Abstract: In this paper, a new technique for automatic generation of complex intruder attacks is proposed. In this approach, the generation of attack scenarios is guided by an intruder strategy. Thus, only attack scenarios achieving the intruder objectives are generated. Therefore, the generated attack graph do not contain redundant nodes or edges, and enables a network administrator to have a better visualisation and apprehension of different attack scenarios for a computer network. In this way, our approach is made as a candidate for increasing accuracy of the attack graph generated based on the use of the intruder strategy.
Keywords: computer security; network; vulnerability; intruder; modelling; attack scenarios; formal technique; attack graph.
International Journal of Information and Computer Security, 2020 Vol.13 No.3/4, pp.428 - 443
Received: 08 Apr 2019
Accepted: 07 Aug 2019
Published online: 06 May 2020 *