Security Attack Analysis Using Attack Patterns

被引:0
|
作者
Li, Tong [1 ]
Paja, Elda [1 ]
Mylopoulos, John [1 ]
Horkoff, Jennifer [2 ]
Beckers, Kristian [3 ]
机构
[1] Univ Trent, I-38100 Trento, Italy
[2] City Univ London, London, England
[3] Tech Univ Munich, Munich, Germany
关键词
Attack Analysis; Attack Pattern; Contextual Goal Model; Prototype; Validation; REQUIREMENTS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people and organizations, as well as technical aspects affecting software systems and the physical infrastructure, requiring a large amount of security knowledge which is difficult to acquire. In this paper, we propose a systematic approach to efficiently leverage a comprehensive attack knowledge repository (CAPEC) in order to identify realistic and detailed attack behaviors, avoiding severe repercussions of security breaches. In particular, we propose a systematic method to model CAPEC attack patterns, which has been applied to 102 patterns, in order to semi-automatically select and apply such patterns. Using the CAPEC patterns as part of a systematic and tool-supported process, we can efficiently operationalize attack strategies and identify realistic alternative attacks on an STS. We validate our proposal by performing a case study on a smart grid scenario.
引用
下载
收藏
页码:513 / 525
页数:13
相关论文
共 50 条
  • [21] Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis
    Du, Haitao
    Yang, Shanchieh Jay
    SOCIAL COMPUTING, BEHAVIORAL-CULTURAL MODELING AND PREDICTION, 2011, 6589 : 129 - 136
  • [22] Automatic security management of smart infrastructures using attack graph and risk analysis
    Ivanov, Denis
    Kalinin, Maxim
    Krudyshev, Vasiliy
    Orel, Evgeniy
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 295 - 300
  • [23] Towards System-Level Security Analysis of IoT Using Attack Graphs
    Fang, Zheng
    Fu, Hao
    Gu, Tianbo
    Hu, Pengfei
    Song, Jinyue
    Jaeger, Trent
    Mohapatra, Prasant
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1142 - 1155
  • [24] A Comprehensive Analysis of Network Security Attack Classification using Machine Learning Algorithms
    Alqahtani, Abdulaziz Saeed
    Altammami, Osamah A.
    Haq, Mohd Anul
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 1269 - 1280
  • [25] Security risk assessment framework for smart car using the attack tree analysis
    Kong, Hee-Kyung
    Hong, Myoung Ki
    Kim, Tae-Sung
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 531 - 551
  • [26] Security risk assessment framework for smart car using the attack tree analysis
    Hee-Kyung Kong
    Myoung Ki Hong
    Tae-Sung Kim
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 531 - 551
  • [27] Evaluation of SOA security metrics using attack graphs
    Magott, Jan
    Woda, Marek
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 277 - 284
  • [28] Patching Security Vulnerabilities Using Stackelberg Security Games on Attack Graphs
    Wachter, Jasmin
    FRONTIERS OF ARTIFICIAL INTELLIGENCE, ETHICS, AND MULTIDISCIPLINARY APPLICATIONS, FAIEMA 2023, 2024, : 83 - 98
  • [29] Measuring Security Risk of Networks Using Attack Graphs
    Noel, Steven
    Jajodia, Sushil
    Wang, Lingyu
    Singhal, Anoop
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2010, 1 (01): : 113 - 123
  • [30] Network Security Situation Analysis Aimed at Distributed Attack
    Fu Yanming
    Chen Wen
    Li Lin
    Pan Yanxian
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 1005 - +