Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering 2003
DOI: 10.1145/1035429.1035434
|View full text |Cite
|
Sign up to set email alerts
|

Representation and analysis of coordinated attacks

Abstract: In this paper, we propose a formal model of coordinated attacks in which several attackers cooperate towards a common malicious goal. The model investigates both attack planning and vulnerability analysis, thereby providing a uniform approach to system and adversary modelling. In addition, the model is general enough to explain both coordinated and single attacks.In the paper, we define the notion of coordinated-attack graph, propose an algorithm for efficient generation of coordinated-attack graphs, demonstra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
31
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(31 citation statements)
references
References 14 publications
0
31
0
Order By: Relevance
“…The coordinated attacks are difficult to handle due to their diverse attack origin nature [3][4][5]. Coordinated attacks can be modeled and analyzed to avoid detection [2,8]. Coordinated attacks are difficult to differentiate between decoy and actual attacks [2].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The coordinated attacks are difficult to handle due to their diverse attack origin nature [3][4][5]. Coordinated attacks can be modeled and analyzed to avoid detection [2,8]. Coordinated attacks are difficult to differentiate between decoy and actual attacks [2].…”
Section: Introductionmentioning
confidence: 99%
“…Coordinated attacks can be modeled and analyzed to avoid detection [2,8]. Coordinated attacks are difficult to differentiate between decoy and actual attacks [2]. There is a large variety of coordinated attacks [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some interesting approaches to perform procedural security have been proposed in the past in [3,4,5,6], and other general security analysis techniques in [7,8]. Voting, however, differs from the environment in which these methodologies are most effective for the following reasons (see also [2,9,10]):…”
Section: Introductionmentioning
confidence: 99%
“…An attacker may steal a database of credit cards for an economic profit, a firm may launch a DoS attack against a competitor's website, and a punk may deface a website for personal satisfaction, or for the sake of proving his hacking skills. Examples of using malicious intelligent agents for distributed coordinated attacks are given in [3,4,5].…”
Section: Introductionmentioning
confidence: 99%