Security Attack Analysis Using Attack Patterns

被引:0
|
作者
Li, Tong [1 ]
Paja, Elda [1 ]
Mylopoulos, John [1 ]
Horkoff, Jennifer [2 ]
Beckers, Kristian [3 ]
机构
[1] Univ Trent, I-38100 Trento, Italy
[2] City Univ London, London, England
[3] Tech Univ Munich, Munich, Germany
关键词
Attack Analysis; Attack Pattern; Contextual Goal Model; Prototype; Validation; REQUIREMENTS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people and organizations, as well as technical aspects affecting software systems and the physical infrastructure, requiring a large amount of security knowledge which is difficult to acquire. In this paper, we propose a systematic approach to efficiently leverage a comprehensive attack knowledge repository (CAPEC) in order to identify realistic and detailed attack behaviors, avoiding severe repercussions of security breaches. In particular, we propose a systematic method to model CAPEC attack patterns, which has been applied to 102 patterns, in order to semi-automatically select and apply such patterns. Using the CAPEC patterns as part of a systematic and tool-supported process, we can efficiently operationalize attack strategies and identify realistic alternative attacks on an STS. We validate our proposal by performing a case study on a smart grid scenario.
引用
收藏
页码:513 / 525
页数:13
相关论文
共 50 条
  • [1] Matching Attack Patterns to Security Patterns Using Neural Networks
    Adebiyi, Adetunji
    Arreymbi, Johnnes
    Imafidon, Chris
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 9 - 17
  • [2] Security Testing Based on Attack Patterns
    Bozic, Josip
    Wotawa, Franz
    2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 4 - 11
  • [4] Analysis on Internet Attack and Security
    Chen, Jing
    ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2387 - 2390
  • [5] Security Analysis of IoT Systems Using Attack Trees
    Beaulaton, Delphine
    Said, Najah Ben
    Cristescu, Ioana
    Sadou, Salah
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2019, 2019, 11720 : 68 - 94
  • [6] SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural Security
    Godbole, Adwait
    Manerkar, Yatin A.
    Seshia, Sanjit A.
    PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, : 2756 - 2770
  • [7] CubeSat Security Attack Tree Analysis
    Falco, Gregory
    Viswanathan, Arun
    Santangelo, Andrew
    8TH IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY (SMC-IT 2021), 2021, : 68 - 76
  • [8] Security attack analysis of safety systems
    Hansen, Kai
    2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
  • [9] An Overview of Security in CoAP: Attack and Analysis
    Arvind, S.
    Narayanan, V. Anantha
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 655 - 660
  • [10] Analysis of Complex Networks for Security Issues using Attack Graph
    Musa, Tanvirali
    Yeo, Kheng Cher
    Azam, Sarni
    Shanmugam, Bharanidharan
    Karim, Asif
    De Boer, Friso
    Nur, Fernaz Narin
    Faisal, Fahad
    2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,