Network Defence Using Attacker-Defender Interaction Modelling

Abstract : Network security is still lacking an efficient system which selects a response action based on observed security events and which is capable of running autonomously. The main reason for this is the lack of an effective defence strategy. In this Ph.D., we endeavour to create such a defence strategy. We propose to model the interaction between an attacker and a defender to comprehend how the attacker’s goals affect his actions and use the model as a basis for a more refined network defence strategy. We formulate the research questions that need to be answered and we discuss, how the answers to these questions relate to the proposed solution. This research is at the initial phase and will contribute to a Ph.D. thesis in four years.
Type de document :
Communication dans un congrès
Rémi Badonnel; Robert Koch; Aiko Pras; Martin Drašar; Burkhard Stiller. 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. Springer International Publishing, Lecture Notes in Computer Science, LNCS-9701, pp.127-131, 2016, Management and Security in the Age of Hyperconnectivity. 〈10.1007/978-3-319-39814-3_12〉
Liste complète des métadonnées

Littérature citée [13 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01632737
Contributeur : Hal Ifip <>
Soumis le : vendredi 10 novembre 2017 - 15:27:21
Dernière modification le : vendredi 10 novembre 2017 - 15:31:19

Fichier

 Accès restreint
Fichier visible le : 2019-01-01

Connectez-vous pour demander l'accès au fichier

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Jana Medková, Pavel Čeleda. Network Defence Using Attacker-Defender Interaction Modelling. Rémi Badonnel; Robert Koch; Aiko Pras; Martin Drašar; Burkhard Stiller. 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. Springer International Publishing, Lecture Notes in Computer Science, LNCS-9701, pp.127-131, 2016, Management and Security in the Age of Hyperconnectivity. 〈10.1007/978-3-319-39814-3_12〉. 〈hal-01632737〉

Partager

Métriques

Consultations de la notice

5