2013 IEEE Security and Privacy Workshops 2013
DOI: 10.1109/spw.2013.36
|View full text |Cite
|
Sign up to set email alerts
|

Invalidating Policies using Structural Information

Abstract: Insider threats are a major threat to many organisations. Even worse, insider attacks are usually hard to detect, especially if an attack is based on actions that the attacker has the right to perform. In this paper we present a step towards detecting the risk for this kind of attacks by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation's policies, our approach invalidates the policies and identifies exempl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8

Relationship

5
3

Authors

Journals

citations
Cited by 36 publications
(50 citation statements)
references
References 15 publications
0
46
0
Order By: Relevance
“…For every possible actor in the system, the goal of the transformation is then to generate an attack that results in the actor having obtained this asset. The overall transformation is a generalised version of policy invalidation [10,11]: . .…”
Section: Transforming Models Without Asset Mobilitymentioning
confidence: 99%
See 1 more Smart Citation
“…For every possible actor in the system, the goal of the transformation is then to generate an attack that results in the actor having obtained this asset. The overall transformation is a generalised version of policy invalidation [10,11]: . .…”
Section: Transforming Models Without Asset Mobilitymentioning
confidence: 99%
“…While we present them in the setting of the TRE S PASS model, the general approach can be applied to any graphical system model. The transformations described in this work can be used as the core technique for policy invalidation [10,11], where policies describe both access control to locations and data, as well as system-wide policies such as admissible actions and actor behaviour. We have implemented the transformations presented in this work in an attack tree generator for TRE S PASS models.…”
Section: Introductionmentioning
confidence: 99%
“…The original approach of invalidation of a global policy based on local policies of infrastructure scenarios [18] uses the idea of Modelchecking: the attempt to prove a security property fails but provides a trace of steps in the infrastructure leading to a state in which the property is violated but more importantly providing a refined attack trace providing detailed steps leading to the attack.…”
Section: Extensions Of Sociological Explanation To State Changementioning
confidence: 99%
“…The original invalidation idea [18] uses the advantages of Modelchecking to find attacks by Insiders on infrastructures. Starting from an invalidated policy, the attempt to modelcheck fails producing an attack vector.…”
Section: Introduction and Overviewmentioning
confidence: 99%
“…Attacks are generated from a socio-technical system model [8,9] and are the basis of computing the risk faced by an organisation if one or more of the identified attacks are realised. Properties of interest of these attacks include required resources, such as time or money, likelihood of success, or impact of the attack.…”
Section: Introductionmentioning
confidence: 99%