Vis enkel innførsel

dc.contributor.authorHaga, Kristian
dc.contributor.authorMeland, Per Håkon
dc.contributor.authorSindre, Guttorm
dc.date.accessioned2021-02-23T09:00:20Z
dc.date.available2021-02-23T09:00:20Z
dc.date.created2020-11-26T14:49:46Z
dc.date.issued2020
dc.identifier.isbn978-3-030-62229-9
dc.identifier.urihttps://hdl.handle.net/11250/2729670
dc.description.abstractTo combat cybercrime, a clearer understanding of the attacks and the offenders is necessary. When there is little available data about attack incidents, which is usually the case for new technology, one can make estimations about the necessary investments an offender would need to compromise the system. The next step would be to implement measures that increase these costs to a level that makes the attack unattractive. Our research method follows the principles of design science, where cycles of research activities are used to create artefacts intended to solve real-world problems. Our artefacts are an approach for creating a resource costs model (RCM) and an accompanying modelling tool implemented as a web application. These are used to find the required attacker resources at each stage of the cyber kill chain. End user feedback show that structured visualisation of the required resources raises the awareness of the cyberthreat. This approach has its strength and provides best accuracy with specific attacks, but is more limited when there are many possible attack vectors of different types.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.ispartofGraphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Paper
dc.relation.urihttps://link.springer.com/chapter/10.1007/978-3-030-62230-5_6
dc.titleBreaking the Cyber Kill Chain by Modelling Resource Costsen_US
dc.typeChapteren_US
dc.description.versionacceptedVersionen_US
dc.identifier.doihttp://dx.doi.org/10.1007/978-3-030-62230-5_6
dc.identifier.cristin1853022
dc.relation.projectNorges forskningsråd: 295969en_US
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-62230-5_6en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel