Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Multifactor Violator Model. Condition-factors and Resource-factors

View through CrossRef
Attack scenarios with limitations were investigated. Resource-factors and condition-factors were set as two types of limitations. Resource-factors are spent at each step of attack and can be replenished completely or partially if a given attack step was successful. A situation, where successful completion of current step with one or more preceding ones is required to replenish resource-factors, is possible. After each step of attack the violator can “exchange” resource-factors to accumulate the required amount of those factors for the next step. The lack of the required amount of resource-factors may either forcefully interrupt an attack or to lower success probability or reduce the time required by protection side to discover the consequences of an attack. This article doesn’t consider the change of relative cost of resource-factors, that is caused by urgency, so that all resource-factors have fixed cost regardless of violator’s reserve of these resource-factors.  Conditions-factors are fixed limitations for conducting an attack. Discrepancy of condition-factors makes it impossible to either start an attack or to finish the current attack’s step. In certain cases the lack in one condition-factor can be compensated with excess of another condition-factor or via spending additional resource-factors. The influence on resource-factors and condition-factors is laid as a basis of protection strategies. The strategy of increasing the values of condition-factors for violator decreases the total amount of attacks on a system by screening beginner violators. The threat level from groups of violators and from experienced violators will remain unchanged. The strategy of increasing the rate of resource-factors spending is designed to interrupt attacks in progress. Strategy of decreasing the amount of resource-factors that can be replenished after successful completion of certain steps of attack scenario is meant to decrease violator’s interest in attacking specifically our system and to decrease the chances of attack repetition if an attack occurred.
Title: Multifactor Violator Model. Condition-factors and Resource-factors
Description:
Attack scenarios with limitations were investigated.
Resource-factors and condition-factors were set as two types of limitations.
Resource-factors are spent at each step of attack and can be replenished completely or partially if a given attack step was successful.
A situation, where successful completion of current step with one or more preceding ones is required to replenish resource-factors, is possible.
After each step of attack the violator can “exchange” resource-factors to accumulate the required amount of those factors for the next step.
The lack of the required amount of resource-factors may either forcefully interrupt an attack or to lower success probability or reduce the time required by protection side to discover the consequences of an attack.
This article doesn’t consider the change of relative cost of resource-factors, that is caused by urgency, so that all resource-factors have fixed cost regardless of violator’s reserve of these resource-factors.
  Conditions-factors are fixed limitations for conducting an attack.
Discrepancy of condition-factors makes it impossible to either start an attack or to finish the current attack’s step.
In certain cases the lack in one condition-factor can be compensated with excess of another condition-factor or via spending additional resource-factors.
The influence on resource-factors and condition-factors is laid as a basis of protection strategies.
The strategy of increasing the values of condition-factors for violator decreases the total amount of attacks on a system by screening beginner violators.
The threat level from groups of violators and from experienced violators will remain unchanged.
The strategy of increasing the rate of resource-factors spending is designed to interrupt attacks in progress.
Strategy of decreasing the amount of resource-factors that can be replenished after successful completion of certain steps of attack scenario is meant to decrease violator’s interest in attacking specifically our system and to decrease the chances of attack repetition if an attack occurred.

Related Results

Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
MULTIFACTOR AUTHENTICATION FOR ONLINE SHOPPING SYSTEM
MULTIFACTOR AUTHENTICATION FOR ONLINE SHOPPING SYSTEM
In this project, a multifactor authentication system was integrated with an online store. Digital and computer security are now crucial for safeguarding user data. One threat is sh...
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Abstract Thoracic outlet syndrome (TOS) is a complex and often overlooked condition caused by the compression of neurovascular structures as they pass through the thoracic outlet. ...
Influence of Strategic Human Resource Management Practices on Performance of Public Universities in Kenya
Influence of Strategic Human Resource Management Practices on Performance of Public Universities in Kenya
Purpose: The objective of the study was to determine the effect of Strategic Human Resource Management Practices (SHRMPs) on performance of public universities. Methodology: ...
Research on Resource Curse Effect of Resource-Dependent Cities: Case Study of Qingyang, Jinchang and Baiyin in China
Research on Resource Curse Effect of Resource-Dependent Cities: Case Study of Qingyang, Jinchang and Baiyin in China
For a specific small-scale region with abundant resources, its copious resources tend to dictate the basic direction of its development, and may subsequently give rise to an indust...
Implementasi Metode MFEP Untuk Menentukan Penerima Bantuan Pupuk Pada Kelompok Tani
Implementasi Metode MFEP Untuk Menentukan Penerima Bantuan Pupuk Pada Kelompok Tani
Abstract : Decision Support System is a system that is able to provide problem solving skills and communication skills for problems with semi-structured and unstructured conditions...
New approaches for resource management and job scheduling for HEP grid computing
New approaches for resource management and job scheduling for HEP grid computing
(English) The Large Hadron Collider (LHC) ALICE (A Large Ion Collider Experiment) experiment uses grid computing for its extensive data processing and analysis. The ALICE Grid is c...

Back to Top