Katia P. Maxwell, Mikel D. Petty, C. D. Colvett, W. A. Cantrell
{"title":"A bottom-up approach to creating a cyberattack model with fine grain components","authors":"Katia P. Maxwell, Mikel D. Petty, C. D. Colvett, W. A. Cantrell","doi":"10.1145/3409334.3452070","DOIUrl":null,"url":null,"abstract":"In today's world every system developer and administrator should be familiar with cyberattacks and possible threats to their organizations systems. Petri Nets have been used to model and simulate cyberattacks allowing for additional knowledge on the planning stages of defending a system. Petri Nets have been used since the 1960's and there exists several extensions and variations of how they are designed, in particular Petri Nets with Players, Strategies and Cost has been recently proposed to model individual cyberattacks on target systems. These models can also be broken down into smaller components to build different models. This study introduces the concept of fine-grain components and a bottom-up approach to create a cyberattack model.","PeriodicalId":148741,"journal":{"name":"Proceedings of the 2021 ACM Southeast Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 ACM Southeast Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3409334.3452070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In today's world every system developer and administrator should be familiar with cyberattacks and possible threats to their organizations systems. Petri Nets have been used to model and simulate cyberattacks allowing for additional knowledge on the planning stages of defending a system. Petri Nets have been used since the 1960's and there exists several extensions and variations of how they are designed, in particular Petri Nets with Players, Strategies and Cost has been recently proposed to model individual cyberattacks on target systems. These models can also be broken down into smaller components to build different models. This study introduces the concept of fine-grain components and a bottom-up approach to create a cyberattack model.