An Empirical Model of the Security Intrusion Process
Artikel i vetenskaplig tidskrift, 1996
This paper describes a security model developed from
empirical data collected from a realistic intrusion experiment in which a number of undergraduate students were
invited to attack a distributed computer system. Relevant
data with respect to their intrusion activities were recorded continuously. We have worked out a hypothesis on typical attacker behavior based on experiences from this and other similar experiments. The hypothesis suggests that the attacking process can be split into three phases: the learning
phase, the standard attack phase and the innovative
attack phase. The probability for successful attacks during
the learning phase is expected to be small and, if a breach
occurs, it is rather a result of pure luck than deliberate
action. During the standard attack phase, this probability is considerably highel; whereas it decreases again in the innovative attack phase. The collected data indicates that the breaches during the standard attack phase are statistically equivalent. Furthermore, the times between breaches seem to be exponentially distributed, which means that traditional methods for reliability modeling of component failures may be applicable