Security Attack Analysis Using Attack Patterns

被引:0
|
作者
Li, Tong [1 ]
Paja, Elda [1 ]
Mylopoulos, John [1 ]
Horkoff, Jennifer [2 ]
Beckers, Kristian [3 ]
机构
[1] Univ Trent, I-38100 Trento, Italy
[2] City Univ London, London, England
[3] Tech Univ Munich, Munich, Germany
关键词
Attack Analysis; Attack Pattern; Contextual Goal Model; Prototype; Validation; REQUIREMENTS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people and organizations, as well as technical aspects affecting software systems and the physical infrastructure, requiring a large amount of security knowledge which is difficult to acquire. In this paper, we propose a systematic approach to efficiently leverage a comprehensive attack knowledge repository (CAPEC) in order to identify realistic and detailed attack behaviors, avoiding severe repercussions of security breaches. In particular, we propose a systematic method to model CAPEC attack patterns, which has been applied to 102 patterns, in order to semi-automatically select and apply such patterns. Using the CAPEC patterns as part of a systematic and tool-supported process, we can efficiently operationalize attack strategies and identify realistic alternative attacks on an STS. We validate our proposal by performing a case study on a smart grid scenario.
引用
收藏
页码:513 / 525
页数:13
相关论文
共 50 条
  • [1] Matching Attack Patterns to Security Patterns Using Neural Networks
    Adebiyi, Adetunji
    Arreymbi, Johnnes
    Imafidon, Chris
    [J]. PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 9 - 17
  • [2] Security Testing Based on Attack Patterns
    Bozic, Josip
    Wotawa, Franz
    [J]. 2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 4 - 11
  • [4] Analysis on Internet Attack and Security
    Chen, Jing
    [J]. ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2387 - 2390
  • [5] Security Analysis of IoT Systems Using Attack Trees
    Beaulaton, Delphine
    Said, Najah Ben
    Cristescu, Ioana
    Sadou, Salah
    [J]. GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2019, 2019, 11720 : 68 - 94
  • [6] CubeSat Security Attack Tree Analysis
    Falco, Gregory
    Viswanathan, Arun
    Santangelo, Andrew
    [J]. 8TH IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY (SMC-IT 2021), 2021, : 68 - 76
  • [7] Security attack analysis of safety systems
    Hansen, Kai
    [J]. 2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
  • [8] An Overview of Security in CoAP: Attack and Analysis
    Arvind, S.
    Narayanan, V. Anantha
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 655 - 660
  • [9] Analysis of Complex Networks for Security Issues using Attack Graph
    Musa, Tanvirali
    Yeo, Kheng Cher
    Azam, Sarni
    Shanmugam, Bharanidharan
    Karim, Asif
    De Boer, Friso
    Nur, Fernaz Narin
    Faisal, Fahad
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [10] An Analysis of Cyber Security Attack Taxonomies
    Derbyshire, Richard
    Green, Benjamin
    Prince, Daniel
    Mauthe, Andreas
    Hutchison, David
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 153 - 161