Conference Paper

Composition of Cyberattack Models

2018 International Conference on Computer Applications in Industry and Engineering
Katia P. Mayfield

ABSTRACT


Cyberattacks are threats that every system developer

and administrators need to be familiar with. The use

of Petri Nets to model cyberattacks has been shown

to provide additional knowledge on the planning

stages of defense systems. There have been several

proposed extensions to a Petri Net model to

accommodate the simulation of these attacks. Petri

Nets with Players, Strategies, and Cost was recently

proposed to model individual cyberattacks on

systems. This study introduces the formalism

required to compose individual Petri Nets with

Players, Strategies, and Cost models from a single

system attack to a full system, which may include

different methods of attacks being attempted,

modeling a more realistic situation. The model

composition described includes the sequential and

parallel possibilities of multiple attacks. An example

of a possible attack scenario is described in order to

demonstrate the practical application of the current

results.

CAINE 2018



ISBN:
978-1-943436-04-0
PUBLISHER:
ACEE
CHIEF EDITOR:
Debnath
CONFERENCE VENUE:
San Diego, California, USA
CONTACT DETAILS:
Debnath
Copyright © Search Innovations. All rights reserved