Transforming graphical system models to graphical attack models

Marieta Georgieva Ivanova, Christian W. Probst*, René Rydhof Hansen, Florian Kammüller

*Corresponding author for this work

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

23 Citations (Scopus)

Abstract

Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset.

Original languageEnglish
Title of host publicationGraphical Models for Security : GraMSec 2015
Number of pages15
PublisherSpringer
Publication date2016
Pages82-96
ISBN (Print)978-3-319-29967-9
ISBN (Electronic)978-3-319-29968-6
DOIs
Publication statusPublished - 2016
EventThe Second International Workshop on Graphical Models for Security - Verona, Italy
Duration: 13 Jul 2015 → …

Conference

ConferenceThe Second International Workshop on Graphical Models for Security
Country/TerritoryItaly
CityVerona
Period13/07/2015 → …
SeriesLecture Notes in Computer Science
Volume9390
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Transforming graphical system models to graphical attack models'. Together they form a unique fingerprint.

Cite this