Modeling and Predicting Attacks

CHAPTER

22

WE HAVE SIGNIFICANTLY COVERED HOW MANAGERS and security personnel work to prevent attacks in both proactive and reactive ways. In this chapter, we will cover some techniques used to predict attacks. Attack modeling techniques are used in determining a wide array of security-related threats, including terrorist attacks. For these purposes, we will introduce stochastic game theory as applied in software applications, which can be used by system and network administrators to predict a set of moves by an adversary in an attack scenario. To begin our discussion, we will present two major approaches to this prediction problem, one called inductive and the other called deductive. There is even a combination ...

Get Information Security for Managers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.