Abstract
As technology advances and AI becomes embedded and accepted into everyday life, the risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting both businesses and individuals alike, and causing financial and reputational loss as a result. Numerous cyberattack analysis methods are available to analyse the risk of cyberattacks and offer the appropriate mitigation strategy. Nonetheless, several cyberattack analysis methods may not be effective and applicable in all cyberattack conditions due to several reasons such as their cost, complexity, resources and expertise. Therefore, this paper builds on an economical, simple and adaptable method for cyberattack analysis using an attack tree with weighted mean probability and risk of attack. It begins with an examination of a weighted mean approach followed by an investigation of the different types of weighted mean functions. Utilizing a series of orderly steps to perform a cyberattack analysis and assess its potential risk in an easy and effective manner. This method provides the means to calculate the potential risk of attack and therefore any mitigation that can be employed to minimise its effect.
| Original language | English |
|---|---|
| Title of host publication | Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK |
| Editors | Nitin Naik, Paul Jenkins, Paul Grace, Longzhi Yang, Shaligram Prajapat |
| Pages | 351-363 |
| ISBN (Electronic) | 9783031475085 |
| DOIs | |
| Publication status | Published - 1 Feb 2024 |
Publication series
| Name | Advances in Computational Intelligence Systems |
|---|---|
| Publisher | Springer |
| Volume | 1453 |
| ISSN (Print) | 2194-5357 |
| ISSN (Electronic) | 2194-5365 |
Keywords
- cyberattack analysis
- attack tree
- Weighted mean risk of attack
- Weighted mean probability of attack
- information theft attack
Fingerprint
Dive into the research topics of 'Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack'. Together they form a unique fingerprint.Research output
- 5 Conference publication
-
Analysing Cyberattacks Using Attack Tree and Fuzzy Rules
Naik, N., Jenkins, P., Grace, P., Naik, D., Prajapat, S., Song, J., Xu, J. & M. Czekster, R., 1 Feb 2024, Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK. Naik, N., Jenkins, P., Grace, P., Yang, L. & Prajapat, S. (eds.). p. 364-378 (Advances in Computational Intelligence Systems; vol. 1453).Research output: Chapter in Book/Published conference output › Conference publication
-
An Introduction to Federated Learning: Working, Types, Benefits and Limitations
Naik, D. & Naik, N., 1 Feb 2024, Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK. Naik, N., Jenkins, P., Grace, P., Yang, L. & Prajapat, S. (eds.). p. 3-17 (Advances in Computational Intelligence Systems ; vol. 1453).Research output: Chapter in Book/Published conference output › Conference publication
Open AccessFile266 Downloads (Pure) -
Artificial Intelligence (AI) Applications in Chemistry
Naik, I., Naik, D. & Naik, N., 1 Feb 2024, Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6–8, 2023, Birmingham, UK. Naik, N., Jenkins, P., Grace, P., Yang, L. & Prajapat, S. (eds.). Springer, p. 545-557 13 p. (Advances in Computational Intelligence Systems; vol. 1453).Research output: Chapter in Book/Published conference output › Conference publication
4 Downloads (Pure)
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver