Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Through the Description of Attacks: A Multidimensional View

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4166))

Included in the following conference series:

Abstract

Cyber attacks are the core of any security assessment of ICT-based systems. One of the more promising research fields in this context is related to the representation of the attack patterns. Several are the models proposed to represent them; these models usually provide a generic representation of attacks. Conversely, the experience shows that attack profiles are strongly dependent upon several “boundary conditions”. This paper defends that from the security assessment perspective, it is necessary to integrate the knowledge contained in the attack patterns with “boundary” knowledge related to vulnerability of the target system and to the potential threats. In this paper, after a characterization of this “boundary knowledge”, we propose an n-dimensional view of the attack tree approach, integrating information on threats and vulnerabilities. Moreover, we show how to use this view to derive knowledge about the security exposure of a target system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aslam, T., Krsul, I., Spafford, E.H.: Use of a taxonomy of security faults. In: Proceedings of the Nineteenth NIST-NCSC National Information Systems Security Conference, pp. 551–560 (1996)

    Google Scholar 

  2. Kumar, S.: Classification and Detection of Computer Intrusions. Ph.D thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana (1995)

    Google Scholar 

  3. Howard, J.: An Analysis of Security Incidents on the Internet, 1989–1995. Ph.D thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania (1997)

    Google Scholar 

  4. Jajodia, S., Noel, S., O’Berry, B.: Topological Analysis of Network Attack Vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, Dordrecht (2004)

    Google Scholar 

  5. Jones, A., Ashenden, D.: Risk Management for Computer Security: Protecting Your Network & Information Assets. Elsevier, Amsterdam (2005)

    Google Scholar 

  6. Code of Practice for Information Security Management. International Standard (ISO/IEC) 17799:2000

    Google Scholar 

  7. Alberts, C., Dorofee, A.: Managing Information Security Risks: The OCTAVE (SM) Approach. Addison Wesley Professional, Reading (2002)

    Google Scholar 

  8. Masera, M., Nai Fovino, I., Sgnaolin, R.: A Framework for the Security Assessment of Remote Control Applications of Critical Infrastructure. ESReDA 29th Seminar, Ispra (2005)

    Google Scholar 

  9. Masera, M., Nai Fovino, I.: Models for Security Assessment and Management. In: Proceeding of the International Workshop on Complex Network and Infrastructure Protection 2006, Rome, Italy (2006)

    Google Scholar 

  10. Alhazmi, O., Malaiya, Y., Ray, I.: Security Vulnerabilities in Software Systems: A Quantitative Perspective. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol. 3654, pp. 281–294. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Bishop, M.: Computer Security Art and Science. Addison Wesley, Reading (2004)

    Google Scholar 

  12. Bugtraq vulnerability database, http://securityfocus.com

  13. Steffan, J., Schumacher, M.: Collaborative attack modeling. In: Proceeding of the Symposium on Applied Computing, Madrid, Spain, pp. 253–259 (2002)

    Google Scholar 

  14. Tidwell, T., Larson, R., Fitch, K., Hale, J.: Modeling Internet Attacks. In: Proceeding of the 2001 IEEE Workshop on Information Assurance and Security. United States Military Academy, West Point (2001)

    Google Scholar 

  15. McDermott, J.: Attack Penetration Testing. In: Proceeding of the 2000 New Security Paradigm Workshop, ACM SigSAC, pp. 15–22. ACM Press, New York (2000)

    Chapter  Google Scholar 

  16. Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., Lutz, R.: A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. In: Proceedings of the first Symposium on Requirements Engineering for Information Security (2001)

    Google Scholar 

  17. Schneier, B.: Modeling Security Threats, Dr. Dobb’s Journal (2001), https://www.schneier.com/paper-attacktrees-ddj-ft.html

  18. Daley, K., Larson, R., Dawkins, J.: A Structural Framework for Modeling Multi-Stage Network Attacks. In: Proceedings of the International Conference on Parallel Processing Workshops. ICPP Workshops, pp. 5–10 (2002)

    Google Scholar 

  19. Masera, M., Nai Fovino, I.: Modelling Information Assets for Security Risk Assessment in Industrial settings. In: 15th EICAR Annual Conference (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fovino, I.N., Masera, M. (2006). Through the Description of Attacks: A Multidimensional View. In: Górski, J. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2006. Lecture Notes in Computer Science, vol 4166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875567_2

Download citation

  • DOI: https://doi.org/10.1007/11875567_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45762-6

  • Online ISBN: 978-3-540-45763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics