Browse by author
Lookup NU author(s): Ohud Almutairi, Dr Nigel Thomas
This is the authors' accepted manuscript of a conference proceedings (inc. abstract) that has been published in its final definitive form by Springer, 2023.
For re-use rights please refer to the publisher's terms and conditions.
This paper represents an initial study into using Performance Evaluation Process Algebra (PEPA) to model and analyse attack graphs. Such an approach adds timing information into the model and therefore extends the range of available analysis techniques. Two methods are proposed to generate a PEPA model based on a pre-existing attack graph with known vulnerabilities. The first method builds a PEPA model consisting of a single sequential component representing both a system and an attacker. The second method generates two sequential components and the system equation. The created PEPA models allow us to perform path analysis, sensitivity analysis and to estimate the time it takes for an attacker to compromise a system. We present two case studies of building and evaluating PEPA models of an attack graph. The PEPA Eclipse plug-in is used to support the evaluation of the PEPA model. We perform passage-time analysis on the models for each attack path in the attack graph, from the first vulnerability in a path until the system was compromised by the attacker. The results illustrate the most and least threatening attack paths and the time it takes the attacker to compromise the system for each path in the attack graph. They also show the impact of the attacker skills and the probability of exploit code availability on an attacker’s time to compromise the system.
Author(s): Almutairi O, Thomas N
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: Practical Applications of Stochastic Modelling: 11th International Workshop (PASM 2022)
Year of Conference: 2023
Pages: 1-26
Online publication date: 05/10/2023
Acceptance date: 15/07/2022
Date deposited: 27/11/2023
ISSN: 1865-0929
Publisher: Springer
URL: https://doi.org/10.1007/978-3-031-44053-3_1
DOI: 10.1007/978-3-031-44053-3_1
ePrints DOI: 10.57711/2bby-mn65
Library holdings: Search Newcastle University Library for this item
Series Title: Communications in Computer and Information Science
ISBN: 9783031440526