METHOD OF DEVELOPMENT OF THREAT SCENARIOS KNOWLEDGE BASE FOR INCIDENT RESPONSE PLATFORM (IRP)
Abstract
The objective of the work is to study the possibility of increasing the efficiency of response to information security (IS) incidents. This can be achieved by developing a system capable of quickly localizing an incident, providing automation of response to an IS threat, taking predetermined actions depending on the details of the threat scenario being implemented. An architecture for constructing an IRP system is proposed, the main modules of which are a response scenario knowledge base, a threat scenario knowledge base, modules for determining the incident status and making decisions on the formation of command information. The problem of developing threat scenarios for creating a scenario knowledge base has been solved, on the basis of which adequate response scenarios can be developed that are unique for each chain of the cybercriminal's actions, events and involved objects. The paper formalizes the method for developing a knowledge base of threat scenarios based on constructing EPC diagrams of scenarios that display multi-component attacks taking into account tactics, techniques, vulnerabilities used, and information security threats (IST) specified in regulatory documents and databases. The paper formulates the rules for constructing EPC diagrams of threat scenarios and the methodology for EPC modeling for objects of influence in ICS. An example of an attack scenario on an industrial network from a global network is considered in the case when a cybercriminal, having attacked a remote user's computer, first gains unauthorized access to the corporate segment and gains a foothold in it for further penetration beyond the perimeter of the process network. The paper presents the developed EPC diagram of a threat scenario indicating the tactics, techniques, intermediate IST, and some vulnerabilities used. The assessment of the probability of scenario implementation is formalized