Visible to the public Global adversarial capability modeling

TitleGlobal adversarial capability modeling
Publication TypeConference Paper
Year of Publication2015
AuthorsSpring, J., Kern, S., Summers, A.
Conference Name2015 APWG Symposium on Electronic Crime Research (eCrime)
Date PublishedMay 2015
PublisherIEEE
ISBN Number978-1-4799-8909-6
KeywordsAnalytical models, Androids, Biological system modeling, CND, Computational modeling, computer network defense, cybersecurity, Humanoid robots, Incident Response, Integrated circuit modeling, intelligence, Intrusion detection, Modeling, pubcrawl170109, security, Software systems
Abstract

Intro: Computer network defense has models for attacks and incidents comprised of multiple attacks after the fact. However, we lack an evidence-based model the likelihood and intensity of attacks and incidents. Purpose: We propose a model of global capability advancement, the adversarial capability chain (ACC), to fit this need. The model enables cyber risk analysis to better understand the costs for an adversary to attack a system, which directly influences the cost to defend it. Method: The model is based on four historical studies of adversarial capabilities: capability to exploit Windows XP, to exploit the Android API, to exploit Apache, and to administer compromised industrial control systems. Result: We propose the ACC with five phases: Discovery, Validation, Escalation, Democratization, and Ubiquity. We use the four case studies as examples as to how the ACC can be applied and used to predict attack likelihood and intensity.

URLhttps://ieeexplore.ieee.org/document/7120797
DOI10.1109/ECRIME.2015.7120797
Citation Keyspring_global_2015