2005
DOI: 10.1007/11555827_14
|View full text |Cite
|
Sign up to set email alerts
|

Using Attack Trees to Identify Malicious Attacks from Authorized Insiders

Abstract: Abstract.A major concern for computer systems security is the threat from malicious insiders who execute perfectly legitimate operations to compromise system security. Unfortunately, most currently available intrusion detection systems (which include anomaly and misuse detection systems) fail to address this problem in a comprehensive manner. In this work we propose a framework that uses an attack tree to identify malicious activities from authorized insiders. We develop algorithms to generate minimal forms of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
62
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 108 publications
(62 citation statements)
references
References 9 publications
(14 reference statements)
0
62
0
Order By: Relevance
“…An attack graph models knowledge about the inter-dependency between system vulnerabilities and knowledge about the network topology in terms of a graph-based data structure [68,48,47]. Model checking analysis techniques are typically used to determine all possible sequences of an attack against a system [70,40,57].…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…An attack graph models knowledge about the inter-dependency between system vulnerabilities and knowledge about the network topology in terms of a graph-based data structure [68,48,47]. Model checking analysis techniques are typically used to determine all possible sequences of an attack against a system [70,40,57].…”
Section: Related Researchmentioning
confidence: 99%
“…Model checking analysis techniques are typically used to determine all possible sequences of an attack against a system [70,40,57]. While threat trees typically focus on the consequence of an attack, attack graphs typically focus on the attacker activity and his/her interaction with the system under threat [48].…”
Section: Related Researchmentioning
confidence: 99%
“…Attack trees have been previously proposed [2,8,11,12] as a systematic method to specify system security based on varying attacks. They help organize intrusion and/or misuse scenarios by 1. utilizing known vulnerabilities and/or weak spots in the system, and 2. analyzing system dependencies and weak links and representing these dependencies in the form of an And-Or tree.…”
Section: Modeling Attacks Using Attack Treesmentioning
confidence: 99%
“…A second criticism of using attack tree to model attack scenarios is that they tend to get unwieldy. Earlier, in one of our works [11], we had shown how we can reduce the size of the attack tree so that it is usable.…”
Section: Modeling Attacks Using Attack Treesmentioning
confidence: 99%
See 1 more Smart Citation