Markov model of cyber attack life cycle triggered by software vulnerability

4Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.

Cite

CITATION STYLE

APA

Hoffmann, R. (2021). Markov model of cyber attack life cycle triggered by software vulnerability. International Journal of Electronics and Telecommunications, 67(1), 35–41. https://doi.org/10.24425/ijet.2021.135941

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free