Transforming Graphical System Models to Graphical Attack Models

نویسندگان

  • Marieta Georgieva Ivanova
  • Christian W. Probst
  • René Rydhof Hansen
  • Florian Kammüller
چکیده

Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent Cyber Security Analysis in Enterprise Networks

In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representation, analysis and visualization. We describe the need of introducing “intelligence” in security analysis, followed by a critical review of state-of-the-art attack graph approaches. Such review leads to the lessons learn...

متن کامل

Modelling the security of recognition-based graphical password schemes

Recognition-based graphical passwords are a suggested alternative authentication mechanism which have received substantial attention in research literature. The literature often presents new schemes, usability studies or propose countermeasures for specific attacks. Whilst this is beneficial, it does not allow for consistent comparison of the security of recognition-based graphical password sch...

متن کامل

Novel 3d Graphical Password Schema Ppt

problems, namely,a novel family of graphical password systems built on top of Captcha Zoo is a Captcha scheme which uses 3D models of horse and dog. mathematical concept related to 3D password, applications of scheme etc. Moreover, Pass. Point – is a recall-based graphical password schema, where a (2) Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, “A Novel 3D. Graphical. also offers a novel ap...

متن کامل

Rule-based joint fuzzy and probabilistic networks

One of the important challenges in Graphical models is the problem of dealing with the uncertainties in the problem. Among graphical networks, fuzzy cognitive map is only capable of modeling fuzzy uncertainty and the Bayesian network is only capable of modeling probabilistic uncertainty. In many real issues, we are faced with both fuzzy and probabilistic uncertainties. In these cases, the propo...

متن کامل

Graphical Analysis of Multi-Environment Trials for Barley Yield Using AMMI and GGE-Biplot Under Rain-Fed Conditions

The AMMI and SREG GGE   are among the models that effectively capture the additive and multiplicative components of genotype × environment interaction (GEI) and provide meaningful interpretation of multi-environment trials’ data set in the breeding programs. The objective of this study was to assess the effect of GEI on grain yield of barely advanced lines and exploit the positive GEI effect us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015