SLIDE 21 41
Introduction Framework
Knowledge base 14 Attack patterns Simulation Optimization
Implementation Example
Experimental setup Results
Conclusions OR 2013 - A simulation-optimization approach for information security risk management
Prolog rule formulation: Brute force
Preconditions
action_bruteForce(Attacker, TargetHost, TargetGroup):- technicalSkillLevel(Attacker, TechnicalSkillLevel), TechnicalSkillLevel >= 1,
- wned(Attacker, AttackHost),
connected(AttackHost, TargetHost, rdpProtocol, rdpPort), accessHost(TargetGroup, TargetHost, _), not(inGroup(Attacker, TargetGroup)).
Postcondition
exec_success_action_bruteForce(Attacker, TargetHost, TargetGroup):- assert(inGroup(Attacker, TargetGroup)).
Impact
action_impact(action_bruteForce, confidentiality). impact_success_bruteForce(Attacker, TargetHost, TargetGroup, SecurityAttribute, Impact):- importance(TargetGroup, SecurityAttribute, Impact).
Simulation attributes
/** cost, time, base probability, maxTries, simultaneous **/ action_properties(action_bruteForce, 0, 18000, 0.01, 0, true). available_action(action_bruteForce).