Transforming Graphical System Models to Graphical Attack Models
نویسندگان
چکیده
Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset.
منابع مشابه
Intelligent Cyber Security Analysis in Enterprise Networks
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representation, analysis and visualization. We describe the need of introducing “intelligence” in security analysis, followed by a critical review of state-of-the-art attack graph approaches. Such review leads to the lessons learn...
متن کاملModelling the security of recognition-based graphical password schemes
Recognition-based graphical passwords are a suggested alternative authentication mechanism which have received substantial attention in research literature. The literature often presents new schemes, usability studies or propose countermeasures for specific attacks. Whilst this is beneficial, it does not allow for consistent comparison of the security of recognition-based graphical password sch...
متن کاملNovel 3d Graphical Password Schema Ppt
problems, namely,a novel family of graphical password systems built on top of Captcha Zoo is a Captcha scheme which uses 3D models of horse and dog. mathematical concept related to 3D password, applications of scheme etc. Moreover, Pass. Point – is a recall-based graphical password schema, where a (2) Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D. Graphical. also offers a novel ap...
متن کاملRule-based joint fuzzy and probabilistic networks
One of the important challenges in Graphical models is the problem of dealing with the uncertainties in the problem. Among graphical networks, fuzzy cognitive map is only capable of modeling fuzzy uncertainty and the Bayesian network is only capable of modeling probabilistic uncertainty. In many real issues, we are faced with both fuzzy and probabilistic uncertainties. In these cases, the propo...
متن کاملGraphical Analysis of Multi-Environment Trials for Barley Yield Using AMMI and GGE-Biplot Under Rain-Fed Conditions
The AMMI and SREG GGE are among the models that effectively capture the additive and multiplicative components of genotype × environment interaction (GEI) and provide meaningful interpretation of multi-environment trials’ data set in the breeding programs. The objective of this study was to assess the effect of GEI on grain yield of barely advanced lines and exploit the positive GEI effect us...
متن کامل