An Empirical Model of the Security Intrusion Process
Journal article, 1996

This paper describes a security model developed from empirical data collected from a realistic intrusion experiment in which a number of undergraduate students were invited to attack a distributed computer system. Relevant data with respect to their intrusion activities were recorded continuously. We have worked out a hypothesis on typical attacker behavior based on experiences from this and other similar experiments. The hypothesis suggests that the attacking process can be split into three phases: the learning phase, the standard attack phase and the innovative attack phase. The probability for successful attacks during the learning phase is expected to be small and, if a breach occurs, it is rather a result of pure luck than deliberate action. During the standard attack phase, this probability is considerably highel; whereas it decreases again in the innovative attack phase. The collected data indicates that the breaches during the standard attack phase are statistically equivalent. Furthermore, the times between breaches seem to be exponentially distributed, which means that traditional methods for reliability modeling of component failures may be applicable

Author

Erland Jonsson

Department of Computer Engineering

Tomas Olovsson

Department of Computer Engineering

Proceedings of the Eleventh Annual Conference on Computer Assurance, 1996. COMPASS 1996.

176-186

Subject Categories

Computer and Information Science

More information

Created

10/7/2017