Cyber-Attack for BGP Systems Using CoPNet Model

被引:0
|
作者
El Bouchti, Abdelali [1 ]
Haqiq, Abdelkrim [1 ]
机构
[1] Hassan 1st Univ, Comp Networks Mobil & Modeling Lab, E NGN Res Grp, FST, Settat, Morocco
关键词
Vulnerability; Cyber-Attack; CoPNet; AT; Attack Modeling; BGP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (CoPNet) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. CoPNet based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building CoPNet based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CoPNet based attack modeling. We show how attack trees can be converted and analyzed in CoPNets. Finally, we provide a case study that illustrates the CoPNet approach.
引用
收藏
页码:10 / 15
页数:6
相关论文
共 50 条
  • [31] Optimization of Cyber-Attack Detection Using the Deep Learning Network
    Van Duong, Lai
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (07): : 159 - 163
  • [32] Adaptive and Lightweight Cyber-Attack Detection in Modern Automotive Cyber-Physical Systems
    Baek, Youngmi
    Park, Seo-Hee
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [33] Cyber-attack as inevitable kinetic war
    Lilienthal, Gary
    Ahmad, Nehaluddin
    COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400
  • [34] An improved cyber-attack detection and classification model for the internet of things systems using fine-tuned deep learning model
    Leni, A. Ezil Sam
    Anand, R.
    Mythili, N.
    Pugalenthi, R.
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2025, 47 (01)
  • [35] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [36] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [37] Cyber-attack, a clear and present danger
    不详
    NEW SCIENTIST, 2009, 201 (2699) : 18 - 19
  • [38] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    SENSORS, 2023, 23 (05)
  • [39] ARTT Taxonomy and Cyber-attack Framewok
    Douad, Mohamed Amine
    Dahmani, Youcef
    2015 FIRST INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION (NTIC), 2015,
  • [40] Secured Cyber-Attack Signatures Distribution using Blockchain Technology
    Ajayi, Oluwaseyi
    Cherian, Melvin
    Saadawi, Tarek
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 482 - 488