2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud) (2015)
Aug. 24, 2015 to Aug. 26, 2015
Measuring the attack damage cost and monitoring the sequence of privilege escalations play a critical role in choosing the right countermeasure by Intrusion Response System (IRS). The existing attack damage cost evaluation approaches inherit some limitations, such as neglecting the dependencies between system assets, ignoring the backward damage of exploited non-goal services, or omitting the potential damage toward the goal service. In this paper, we propose a defense-centric model to calculate the damage cost of a multi-step attack. The main advantage of this model is providing an accurate damage cost by considering not only the damaged services (non-goal services) but also the potential damage toward the attacker target (goal service). To track the attacker's progress and find the attack path, an Attack-Defense Tree (ADT) is used. The model has been implemented in, but is not limited to, the cloud environment and tested with a multi-step attack scenario.
Servers, Hidden Markov models, Network topology, Switches, Intrusion detection, Cloud computing
A. Shameli-Sendi, H. Louafi, W. He and M. Cheriet, "A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation," 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud)(FICLOUD), Rome, Italy, 2015, pp. 145-149.