Title
Building Computer Network Attacks
Authors
Ariel Futoransky, Luciano Notarfrancesco, Gerardo Richarte and Carlos Sarraute
In
CoreLabs Technical Report (arXiv:1006.1916)
Date published
2003-03-31
Keywords
Attack models, attack graphs, autonomous agents, autonomous planning, automated penetration test, attack simulation, network vulnerability evaluation.

Abstract

In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

Attachments