Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research 2011
DOI: 10.1145/2179298.2179368
|View full text |Cite
|
Sign up to set email alerts
|

Toward hybrid attack dependency graphs

Abstract: This extended abstract presents a set of continuous-domain extensions to the attack graph, a formalism used to model the interactions of multiple exploits and assets in a network. These extensions result in a new modeling framework called the hybrid attack dependency graph, which provides the novel capability of modeling continuous state variables and their evolution over the execution of attacks with duration.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 14 publications
(13 reference statements)
0
11
0
Order By: Relevance
“…While one can certainly imagine scenarios where this assumption does not hold, it is somewhat justified by the idea that an attacker is unlikely to give up privileges after obtaining them (Capobianco et al, 2019). This monotonicity idea has led to a variation on attack graphs called attack dependency graphs (Louthan et al, 2011). Attack dependency graphs use different types of nodes compared to a basic attack graph, but the encoded information is approximately equivalent if the statetransition model satisfies the monotonicity assumption.…”
Section: Attack Graphsmentioning
confidence: 99%
“…While one can certainly imagine scenarios where this assumption does not hold, it is somewhat justified by the idea that an attacker is unlikely to give up privileges after obtaining them (Capobianco et al, 2019). This monotonicity idea has led to a variation on attack graphs called attack dependency graphs (Louthan et al, 2011). Attack dependency graphs use different types of nodes compared to a basic attack graph, but the encoded information is approximately equivalent if the statetransition model satisfies the monotonicity assumption.…”
Section: Attack Graphsmentioning
confidence: 99%
“…The tool automates the task of creating HAGs by compiling the inputs specified and making the appropriate connections. A Hybrid Attack Dependency Graph (HADG) was presented by [33], which allowed discretization into intervals of the reachable and related ranges of the system's state variables and their evolution over the execution of attacks with duration. The HAG generation software of [33] was used by [34] to model a Cyber physical System's attack for a smart grid in which an attacker has to obtain access to a Supervisory Control and Data Acquisition (SCADA) system to cause the transformer to overheat.…”
Section: Related Workmentioning
confidence: 99%
“…The HAG generation software described in [1,2] builds the HAG by matching exploit patterns to a particular system state (CPS definition). Figure 1 illustrates the generation of a HAG for an energy draining attack.…”
Section: Security Analysis With Hybrid Attack Graphsmentioning
confidence: 99%
“…The software takes two files as input: a CPS description file and an exploit file [1,2]. The CPS description file contains information about the devices in the system, network topology, the software and operating system running on each device, and a list of qualities (e.g.…”
Section: Security Analysis With Hybrid Attack Graphsmentioning
confidence: 99%
See 1 more Smart Citation