Security intrusion process: an empirical model
Journal article, 1997

This paper describes a security model developed from empirical data collected from a realistic intrusion experiment in which a number of undergraduate students were invited to attack a distributed computer system. Relevant data, with respect to their intrusion activities, were recorded continuously. We have worked out a hypothesis on typical attacker behavior based on experiences from this and other similar experiments. The hypothesis suggests that the attacking process can be split into three phases: the learningphase, the standard attack phase and the innovative attack phase. The probability for successful attacks during the learning phase is expected to be small and, if a breach occurs, it is rather a result of pure luck than deliberate action. During the standard attack phase, this probability is considerably higher, whereas it decreases again in the innovative attack phase. The collected data indicates that the breaches during the standard attack phase are statistically equivalent. Furthermore, the times between breaches seem to be exponentially distributed, which means that traditional methods for reliability modelling of component failures may be applicable.

penetration test

security evaluation

attacker behavior

security

Author

Erland Jonsson

Department of Computer Engineering

Tomas Olovsson

Department of Computer Engineering

IEEE Aerospace and Electronic Systems Magazine

0885-8985 (ISSN)

Vol. 12 4 7-17

Subject Categories

Computer Engineering

Information Science

Computer Science

Areas of Advance

Information and Communication Technology

DOI

10.1109/62.575994

More information

Created

10/8/2017