Skip to main content

Analysis of Advanced Cyber Attacks with Quantified ESM

Part of the Lecture Notes in Computer Science book series (LNISA,volume 9483)

Abstract

Advanced cyber attacks represent a serious threat to a critical infrastructure. Attack modeling is a way to timely recognize weaknesses and potential threat performances, which in practice want to be avoided. In order to improve attack modeling we defined an attack tree-based model named the Enhanced structured model (ESM). The ESM enables better understanding of attack implementation, which results in improved identification of security weaknesses and analysis of the existing security policy. The ESM is also very suitable as a tool to impart knowledge in the field of advanced cyber security in terms of offensive security. To enable analysts more credible basis for decision support and even more effective transfer of knowledge and new insights into the educational process we present in this paper a quantification of the ESM.

Keywords

  • Attack vector
  • Enhanced structural model
  • Expert assessment
  • Malicious software code
  • Vulnerability

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-27051-7_20
  • Chapter length: 14 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-27051-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   99.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.

References

  1. Pietre-Cambacedes, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with Boolean logic Driven Markov Processes (BDMP). In: European Dependable Computing Conference, pp. 199–208 (2010)

    Google Scholar 

  2. Fovino, I.N., Masera, M., De Cian, A.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 9, 1394–1402 (2009)

    CrossRef  Google Scholar 

  3. Ivanc, B., Klobucar, T.: Attack modeling in the critical infrastructure. J. Electr. Eng. Comput. Sci. 81(5), 285–292 (2014)

    Google Scholar 

  4. Ivanc, B., Klobučar, T.: Modelling of information attacks on critical infrastructure by using an enhanced structural model, Jozef Stefan International Postgraduate School (2013)

    Google Scholar 

  5. Yan, J., He, M., Li, T.: A Petri-net model of network security testing. In: IEEE International Conference on Computer Science and Automation Engineering, pp. 188–192 (2011)

    Google Scholar 

  6. Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A: Syst. Humans 4, 853–865 (2010)

    CrossRef  Google Scholar 

  7. Camtepe, A., Bulent, Y.: Modeling and detection of complex attacks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, pp. 234–243 (2007)

    Google Scholar 

  8. Edge, K., Raines, R., Grimaila, M., Baldwin, R., Bennington, R., Reuter, C.: The use of attack and protection trees to analyze security for an online banking system. In: Proceedings of the 40th Hawaii International Conference on System Sciences, p. 144b (2007)

    Google Scholar 

  9. Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: The First International Conference on Availability, Reliability and Security, pp. 416–423 (2006)

    Google Scholar 

  10. Mell, P., Scarfone, K., Romanosky, S.: A Complete Guide to the Common Vulnerability Scoring System Version 2.0. (2007)

    Google Scholar 

  11. Kordy, B., Pietre-Cambacedes, L., Schweitzer, P.: DAG-based attack and defense modeling: Don’t miss the forest for the attack trees. Comput. Sci. Rev. 13–14, 1–38 (2014)

    CrossRef  Google Scholar 

  12. Khand, P.A.: System level security modeling using attack trees. In: 2nd International Conference on Computer, Control and Communication, pp. 1–7 (2009)

    Google Scholar 

  13. Bagnato, A., Kordy, B., Meland, P.H., Schweitzer, P.: Attribute decoration of attack-defense trees. Int. J. Secure Softw. Eng. 3(2), 1–35 (2012)

    CrossRef  Google Scholar 

  14. Paul, S.: Towards automating the construction & maintenance of attack trees: a feasibility study. In: Proceedings of the 1st International Workshop on Graphical Models for Security, pp. 31–46 (2014)

    Google Scholar 

  15. Jhawar, R., Kordy, B., Mauw, S., Radomirović, S., Trujillo-Rasua, R.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IFIP AICT, vol. 455, pp. 339–353. Springer, Heidelberg (2015)

    CrossRef  Google Scholar 

  16. Hong, J.B.: Scalable and Adaptable Security Modelling and Analysis, PhD Thesis. University of Canterbury (2015)

    Google Scholar 

  17. Almasizadeh, J., Azgomi, M.A.: Mean privacy: a metric for security of computer systems. Comput. Commun. 52, 47–59 (2014)

    CrossRef  Google Scholar 

  18. Dewri, R., Ray, I., Poolsappasit, N., Whitley, D.: Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Int. J. Inf. Secur. 11(3), 167–188 (2012)

    CrossRef  Google Scholar 

  19. Zhao, S., Li, X., Xu, G., Zhang, L., Feng, Z.: Attack tree based android malware detection with hybrid analysis. In: IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1–8 (2014)

    Google Scholar 

  20. Lenin, A., Willemson, J., Sari, D.P.: Attacker profiling in quantitative security assessment based on attack trees. In: Bernsmed, K., Fischer-Hübner, S. (eds.) NordSec 2014. LNCS, vol. 8788, pp. 199–212. Springer, Heidelberg (2014)

    Google Scholar 

  21. Dalton, G.C., Mills, R.F., Colombi, J.M., Raines, R.A.: Analyzing attack trees using generalized stochastic Petri nets. In: Information Assurance Workshop, pp. 116–123 (2006)

    Google Scholar 

  22. Pudar, S., Manimaran, G., Liu, C.C.: PENET: a practical method and tool for integrated modeling of security attacks and countermeasures. Comput. Secur. 28(8), 754–771 (2009)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Blaž Ivanc .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ivanc, B., Klobučar, T. (2015). Analysis of Advanced Cyber Attacks with Quantified ESM. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)