Javascript must be enabled to continue!
Multifactor Violator Model. Condition-factors and Resource-factors
View through CrossRef
Attack scenarios with limitations were investigated. Resource-factors and condition-factors were set as two types of limitations. Resource-factors are spent at each step of attack and can be replenished completely or partially if a given attack step was successful. A situation, where successful completion of current step with one or more preceding ones is required to replenish resource-factors, is possible. After each step of attack the violator can “exchange” resource-factors to accumulate the required amount of those factors for the next step. The lack of the required amount of resource-factors may either forcefully interrupt an attack or to lower success probability or reduce the time required by protection side to discover the consequences of an attack. This article doesn’t consider the change of relative cost of resource-factors, that is caused by urgency, so that all resource-factors have fixed cost regardless of violator’s reserve of these resource-factors.
Conditions-factors are fixed limitations for conducting an attack. Discrepancy of condition-factors makes it impossible to either start an attack or to finish the current attack’s step. In certain cases the lack in one condition-factor can be compensated with excess of another condition-factor or via spending additional resource-factors.
The influence on resource-factors and condition-factors is laid as a basis of protection strategies. The strategy of increasing the values of condition-factors for violator decreases the total amount of attacks on a system by screening beginner violators. The threat level from groups of violators and from experienced violators will remain unchanged. The strategy of increasing the rate of resource-factors spending is designed to interrupt attacks in progress. Strategy of decreasing the amount of resource-factors that can be replenished after successful completion of certain steps of attack scenario is meant to decrease violator’s interest in attacking specifically our system and to decrease the chances of attack repetition if an attack occurred.
European Open Science Publishing
Title: Multifactor Violator Model. Condition-factors and Resource-factors
Description:
Attack scenarios with limitations were investigated.
Resource-factors and condition-factors were set as two types of limitations.
Resource-factors are spent at each step of attack and can be replenished completely or partially if a given attack step was successful.
A situation, where successful completion of current step with one or more preceding ones is required to replenish resource-factors, is possible.
After each step of attack the violator can “exchange” resource-factors to accumulate the required amount of those factors for the next step.
The lack of the required amount of resource-factors may either forcefully interrupt an attack or to lower success probability or reduce the time required by protection side to discover the consequences of an attack.
This article doesn’t consider the change of relative cost of resource-factors, that is caused by urgency, so that all resource-factors have fixed cost regardless of violator’s reserve of these resource-factors.
Conditions-factors are fixed limitations for conducting an attack.
Discrepancy of condition-factors makes it impossible to either start an attack or to finish the current attack’s step.
In certain cases the lack in one condition-factor can be compensated with excess of another condition-factor or via spending additional resource-factors.
The influence on resource-factors and condition-factors is laid as a basis of protection strategies.
The strategy of increasing the values of condition-factors for violator decreases the total amount of attacks on a system by screening beginner violators.
The threat level from groups of violators and from experienced violators will remain unchanged.
The strategy of increasing the rate of resource-factors spending is designed to interrupt attacks in progress.
Strategy of decreasing the amount of resource-factors that can be replenished after successful completion of certain steps of attack scenario is meant to decrease violator’s interest in attacking specifically our system and to decrease the chances of attack repetition if an attack occurred.
Related Results
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
MULTIFACTOR AUTHENTICATION FOR ONLINE SHOPPING SYSTEM
MULTIFACTOR AUTHENTICATION FOR ONLINE SHOPPING SYSTEM
In this project, a multifactor authentication system was integrated with an online store. Digital and computer security are now crucial for safeguarding user data. One threat is sh...
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Abstract
Thoracic outlet syndrome (TOS) is a complex and often overlooked condition caused by the compression of neurovascular structures as they pass through the thoracic outlet. ...
Establishment and Application of the Multi-Peak Forecasting Model
Establishment and Application of the Multi-Peak Forecasting Model
Abstract
After the development of the oil field, it is an important task to predict the production and the recoverable reserve opportunely by the production data....
Identity and Direction of Tourism Resource Theories as a Sub Field of Tourism Sciences in Korea
Identity and Direction of Tourism Resource Theories as a Sub Field of Tourism Sciences in Korea
This current study offers a review of tourism resource theories in Korea and foreign countries through a document review research approach. From this review, the present study disc...
A randomized algorithm for exact transduction
A randomized algorithm for exact transduction
Random sampling is an efficient method dealing with constrained optimization problems. In computational geometry, it has been applied, through Clarkson's algorithm [10], to solve a...
Dynamics of gunshot wound microbial contamination during complex surgical treatment
Dynamics of gunshot wound microbial contamination during complex surgical treatment
The aim — to improve results of surgical treatment for victims with infected gunshot wounds in soft tissues due to implementation of the complex multifactor surgical treatment.Mate...
Polymetallic Nodules Resource Estimation in the Suoi Thau-Sang Than Area, Northeastern Vietnam
Polymetallic Nodules Resource Estimation in the Suoi Thau-Sang Than Area, Northeastern Vietnam
1,720 chemical, mineral, and petrography samples in the Suoi Thau-Sang Than area, northeastern Vietnam were collected to investi - gate polymetallic nodules resource. The similarit...


