Attack tree generation by policy invalidation

Georgieva Ivanova, Marieta and Hansen, Rene Rydhof and Kammueller, Florian and Probst, Christian (2015) Attack tree generation by policy invalidation. In: 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015). Springer. (Accepted/In press)

Full text is not in this repository.

Abstract

Attacks on systems and organisations increasingly exploit human actors, for example through social engineering. This humanising of attacks complicates their formal treatment and automatic identification; formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps. To the best of our knowledge this is the first formalisation of an approach to generating attack trees including steps on the technical and social level.

Item Type: Book Section
Research Areas: A. > School of Science and Technology > Computer Science
Item ID: 16978
Depositing User: Florian Kammueller
Date Deposited: 15 Jun 2015 10:19
Last Modified: 13 Oct 2016 14:35
URI: http://eprints.mdx.ac.uk/id/eprint/16978

Actions (login required)

Edit Item Edit Item