Probabilistic Analysis In Cyber Security: How To Determine The Likelihood Of Events

Deterministic Analysis and Probabilistic Analysis In Cybersecurity

Statistical techniques can be used to evaluate the risk that exploits will be successful in a given network. This type of analysis can help decision-makers to better evaluate the cost of mitigating a threat with the damage that an exploit could cause.
Two general approaches used to do this are deterministic and probabilistic analysis.
The deterministic analysis evaluates risk based on what is known about a vulnerability.
It assumes that for an exploit to be successful all prior steps in the exploit process must also be successful.
This type of risk analysis can only describe the worst case. However, many threat actors, although aware of the process to carry out an exploit, may lack the knowledge or expertise to successfully complete each step on the path to a successful exploit.
This can give the cybersecurity analyst an opportunity to detect the exploit and stop it before it proceeds any further.
The probabilistic analysis estimates the potential success of an exploit by estimating the likelihood that if one step in an exploit has successfully been completed that the next step will also be successful.
Probabilistic analysis is especially useful in real-time network security analysis in which numerous variables are at play and a given threat actor can make unknown decisions as an exploit is pursued.

 

The probabilistic analysis relies on statistical techniques that are designed to estimate the probability that an event will occur based on the likelihood that prior events will occur.
Using this type of analysis, the most likely paths that an exploit will take can be estimated and the attention of security personnel can be focused on preventing or detecting the most likely exploit.
In a deterministic analysis, all of the information to accomplish an exploit is assumed to be known. The characteristics of the exploit, such as the use of specific port numbers, are known either from other instances of the exploit or because standardized ports are in use.
In probabilistic analysis, it is assumed that the port numbers that will be used can only be predicted with some degree of confidence.
In this situation, an exploit that uses dynamic port numbers, for example, cannot be analyzed deterministically. Such exploits have been optimized to avoid detection by firewalls that use static rules.

 

PEOPLE ALSO READ:  Blogging As Part Of Online Marketing: What You Need To Know

The two approaches are summarized below.

  • Deterministic Analysis – For an exploit to be successful, all prior steps in the exploit must also be successful. The cybersecurity analyst knows the steps for a successful exploit.
  • Probabilistic Analysis – Statistical techniques are used to determine the probability that a successful exploit will occur based on the likelihood that each step in the exploit will succeed.

 

Do you enjoy this article, add Our Posts to your Reading List.

To Get Email Updates when we post new contents, Click Here.

Loading

Related Posts

6 Ways To Convert Leads Into Sales6 Ways To Convert Leads Into Sales
6 Ways To Converting Leads to Sales...
 
PEOPLE ALSO READ:  MAC Addresses And IP Addresses: Highlighting The Facts
In my previous article, I talked about some of the...
Read more
Day 6: MFM 2021 70 Days Fasting and PrayersDay 6: MFM 2021 70 Days Fasting and Prayers
Day 6: MFM 2021 70 Days Fasting...
  Devotional Songs. Praise and Worship. Prayers of Praise and Thanksgiving.    141. Any contradiction...
Read more
Powerful Prayer For HealingPowerful Prayer For Healing
Powerful Prayer For Healing
  Powerful Prayer For Healing Hurts So Bad.   Dear God, It hurts so bad....
Read more
disciple as an eagledisciple as an eagle
Lessons From The Ten Lepers. RCCG Sunday...
TOPIC: Lessons From The Four Lepers   MEMORY VERSE: “And there were four...
Read more
RCCG SOD Year One. Demon On Assignment. Part One.RCCG SOD Year One. Demon On Assignment. Part One.
RCCG SOD Year One. Demon On Assignment....
RCCG SOD Year One. Demon On Assignment. Part One.     Devil on...
Read more
Day 27: 2022 MFM 70 Days Fasting And PrayersDay 27: 2022 MFM 70 Days Fasting And Prayers
Day 27: 2022 MFM 70 Days Fasting...
  Devotional Songs Praise and Worship Prayers of Praise and Thanksgiving   169. Powers giving...
Read more
Certificate in Project Management: Benefits and OpportunitiesCertificate in Project Management: Benefits and Opportunities
Certificate in Project Management: Benefits and Opportunities
Certificate in Project Management: Benefits and Opportunities   A Certificate in Project...
Read more
Who Says That Lieing Cannot Kill ? Ask Ananias And SaphirraWho Says That Lieing Cannot Kill ? Ask Ananias And Saphirra
Who Says That Lieing Cannot Kill ?...
  OPENING PRAYER: Father, please deliver me from every form of lies. PREVIOUS...
Read more
CRMNuggets Whatsapp Channel
truehost
About Adeniyi Salau 1749 Articles
Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Be the first to comment

Leave a Reply

Your email address will not be published.


*