2021
DOI: 10.1007/s10270-021-00898-7
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

Abstract: Enterprise systems are growing in complexity, and the adoption of cloud and mobile services has greatly increased the attack surface. To proactively address these security issues in enterprise systems, this paper proposes a threat modeling language for enterprise security based on the MITRE Enterprise ATT&CK Matrix. It is designed using the Meta Attack Language framework and focuses on describing system assets, attack steps, defenses, and asset associations. The attack steps in the language represent adver… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 88 publications
(51 citation statements)
references
References 54 publications
0
26
0
1
Order By: Relevance
“…Exceptions are papers that utilize some well-known enumerations and knowledge bases. A threat modeling language that utilized ATT&CK was proposed in [10]. ATT&CK and CVE (Common Vulnerabilities and Exposures [11]) were utilized in [12].…”
Section: B Attack Graphsmentioning
confidence: 99%
“…Exceptions are papers that utilize some well-known enumerations and knowledge bases. A threat modeling language that utilized ATT&CK was proposed in [10]. ATT&CK and CVE (Common Vulnerabilities and Exposures [11]) were utilized in [12].…”
Section: B Attack Graphsmentioning
confidence: 99%
“…Several academic studies propose original security methods and models using the ATT&CK framework-the proposed methods and models by academia map to one of four use cases listed above. For example, Outkin et al present a gametheoretic method that uses the MITRE ATTA&CK APT3 threat data to model attacker-defender interaction and enhance the defender strategies (Outkin et al, 2021) (Xiong et al, 2021).…”
Section: Mitre Attandckmentioning
confidence: 99%
“…Process under Multiattack Behavior. After constructing the incidence matrix of data node state and the matrix model of the multiattack behavior in 3.1 and 3.2, respectively, the overall attack process is matrix-modeled [19], which is used to describe the attack path and attack process and provide further proof for judging the kind of the attack behavior. At the same time, the model can describe the state change of WSN data nodes after being attacked.…”
Section: Matrix Modeling and Analysis Of The Overall Attackmentioning
confidence: 99%