Abstract:
Application of modeling techniques of network attacks is a promising task in infor-mation security. This paper describes an approach to analytical modeling of network-based attacks trees. The novelty of the proposed method lays in the possibility of its application for systems operating in near real time mode. The paper describes the main domain models and algorithms of attack trees construction and modification.
Keywords:attack trees, security evaluation, models of networks, malefactors and attack actions.