2013
DOI: 10.1007/978-3-319-03584-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks

Abstract: International audienceRecent attacks are better coordinated, difficult to discover, and inflict severe damages to networks. However, existing response systems handle the case of a single ongoing attack. This limitation is due to the lack of an appropriate model that describes coordinated attacks. In this paper, we address this limitation by presenting a new formal description of individual, coordinated, and concurrent attacks. Afterwards, we combine Graph Theory and our attack description in order to model att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The main drawback of this approach is the inability to evaluate the impact of selected responses over its dependent services. Samarji et al 7 propose to combine graph theory and a new formal description of individual, coordinated, and concurrent attacks in order to model attack graphs that cover the 3 attacks types. The approach uses situation calculus to automatically generate attack graphs that leverage response systems means to estimate the global risk inferred by simultaneous ongoing attacks, and to reason about appropriate responses.…”
Section: Related Workmentioning
confidence: 99%
“…The main drawback of this approach is the inability to evaluate the impact of selected responses over its dependent services. Samarji et al 7 propose to combine graph theory and a new formal description of individual, coordinated, and concurrent attacks in order to model attack graphs that cover the 3 attacks types. The approach uses situation calculus to automatically generate attack graphs that leverage response systems means to estimate the global risk inferred by simultaneous ongoing attacks, and to reason about appropriate responses.…”
Section: Related Workmentioning
confidence: 99%
“…In order to achieve this goal, attacking sources, controlled by one or several attacking entities, may cooperate by resource sharing, task allocation, synchronization,etc. Many works focus on complex attack and the way to design them as in [14] where the authors define a formal description of individual and coordinated attacks.…”
Section: Security Eventsmentioning
confidence: 99%
“…Security countermeasures and their limitations [1] system is unable to process all the incoming messages, the other part of attackers captures those messages as an ITS server and manipulates them. We use the modelisation of complex attacks described in [14] to define an example of complex attack in automotive system (CXA) corresponding to the type "Coordinated Attack with Load Accumulation -CALA". CALA is defined in [14] as a coordinated attack in which attackers accumulate their capabilities.…”
Section: An Example Of Complex Attack In Automotive Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Kordy et al [12,13] proposed that attack trees be modeled in propositional logic, but in this model attacks can be freely duplicated and contracted which goes against the process nature of an attack tree. However, linear logic restores this natural interpretation without loosing the process interpretation of attack trees and without having to resort to complicated notation unlike models similar to the situation calculus [17]. By connecting attack trees to logic we can also tap into the long standing research and development of automation, for example, SAT, SMT, proof search, etc.…”
Section: Introductionmentioning
confidence: 99%