2014
DOI: 10.1016/j.cosrev.2014.07.001
|View full text |Cite
|
Sign up to set email alerts
|

DAG-based attack and defense modeling: Don’t miss the forest for the attack trees

Abstract: This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and Bayesian networks are two well-known approaches to security modeling. However there exist more than 30 DAG-based methodologies, each having different features and goals. The objective of this survey is to present a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
219
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 259 publications
(220 citation statements)
references
References 172 publications
(271 reference statements)
1
219
0
Order By: Relevance
“…For the approach in this paper, we essentially only require that attack goals can be divided into sub-goals that can be combined either conjunctively (must all be completed) or disjunctively (only one sub-goal need to be completed). This is very similar to attack trees [1,2], and just as for these it would be interesting to allow more complex combinations at a later point.…”
Section: Graphical System Models and Attack Modelsmentioning
confidence: 71%
See 3 more Smart Citations
“…For the approach in this paper, we essentially only require that attack goals can be divided into sub-goals that can be combined either conjunctively (must all be completed) or disjunctively (only one sub-goal need to be completed). This is very similar to attack trees [1,2], and just as for these it would be interesting to allow more complex combinations at a later point.…”
Section: Graphical System Models and Attack Modelsmentioning
confidence: 71%
“…Our approach is generally applicable to graphical system models and graphical attack models; examples for instances of such models include system models, e.g., ExASyM [7] and Portunes [8], and attack models such as attack trees and attack-defence trees [1,2].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…To communicate the attacks identified in an organisation, attack trees [2,3] are often used; due to their relatively loose definition, attack trees can be adapted to the requirements in many different settings. Attack trees provide structure to the represented attacks by relating a node representing the goal of an attack with different alternative or required sub-goals, which an attacker may or must perform.…”
Section: Introductionmentioning
confidence: 99%