A Template-based Method for the Generation of Attack Trees

Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Shaikh, Fengjun Zhou

Research output: Contribution to conferencePaper

Abstract

Attack trees are used in cybersecurity analysis to give an analyst a view of all the ways in which an attack can be carried out. Attack trees can become large, and developing them by hand can be tedious and error-prone. In this paper the automated generation of attack trees is considered. The method proposed is based on a library of attack templates – parameterisable patterns of attacks such as denial of service or eavesdropping – and that also uses an abstract model of the network
architecture under attack. A pseudocode implementation of the method is also presented. The example application given is from the automotive domain and using an architecture consisting of linked CAN networks – a network configuration found in virtually every current vehicle.
Original languageEnglish
Publication statusAccepted/In press - 14 Nov 2019
EventInternational Conference on Information Security Theory and Practice - Paris, France
Duration: 11 Dec 201912 Dec 2019
http://www.wistp.org/

Conference

ConferenceInternational Conference on Information Security Theory and Practice
Abbreviated titleWISTP
CountryFrance
CityParis
Period11/12/1912/12/19
Internet address

Cite this

Bryans, J., Liew, L. S., Nguyen, H. N., Sabaliauskaite, G., Shaikh, S., & Zhou, F. (Accepted/In press). A Template-based Method for the Generation of Attack Trees. Paper presented at International Conference on Information Security Theory and Practice, Paris, France.

A Template-based Method for the Generation of Attack Trees. / Bryans, Jeremy; Liew, Lin Shen ; Nguyen, Hoang Nga; Sabaliauskaite, Giedre ; Shaikh, Siraj; Zhou, Fengjun .

2019. Paper presented at International Conference on Information Security Theory and Practice, Paris, France.

Research output: Contribution to conferencePaper

Bryans, J, Liew, LS, Nguyen, HN, Sabaliauskaite, G, Shaikh, S & Zhou, F 2019, 'A Template-based Method for the Generation of Attack Trees' Paper presented at International Conference on Information Security Theory and Practice, Paris, France, 11/12/19 - 12/12/19, .
Bryans J, Liew LS, Nguyen HN, Sabaliauskaite G, Shaikh S, Zhou F. A Template-based Method for the Generation of Attack Trees. 2019. Paper presented at International Conference on Information Security Theory and Practice, Paris, France.
Bryans, Jeremy ; Liew, Lin Shen ; Nguyen, Hoang Nga ; Sabaliauskaite, Giedre ; Shaikh, Siraj ; Zhou, Fengjun . / A Template-based Method for the Generation of Attack Trees. Paper presented at International Conference on Information Security Theory and Practice, Paris, France.
@conference{dc946111dc404edaaf754247fd11944e,
title = "A Template-based Method for the Generation of Attack Trees",
abstract = "Attack trees are used in cybersecurity analysis to give an analyst a view of all the ways in which an attack can be carried out. Attack trees can become large, and developing them by hand can be tedious and error-prone. In this paper the automated generation of attack trees is considered. The method proposed is based on a library of attack templates – parameterisable patterns of attacks such as denial of service or eavesdropping – and that also uses an abstract model of the networkarchitecture under attack. A pseudocode implementation of the method is also presented. The example application given is from the automotive domain and using an architecture consisting of linked CAN networks – a network configuration found in virtually every current vehicle.",
author = "Jeremy Bryans and Liew, {Lin Shen} and Nguyen, {Hoang Nga} and Giedre Sabaliauskaite and Siraj Shaikh and Fengjun Zhou",
year = "2019",
month = "11",
day = "14",
language = "English",
note = "International Conference on Information Security Theory and Practice, WISTP ; Conference date: 11-12-2019 Through 12-12-2019",
url = "http://www.wistp.org/",

}

TY - CONF

T1 - A Template-based Method for the Generation of Attack Trees

AU - Bryans, Jeremy

AU - Liew, Lin Shen

AU - Nguyen, Hoang Nga

AU - Sabaliauskaite, Giedre

AU - Shaikh, Siraj

AU - Zhou, Fengjun

PY - 2019/11/14

Y1 - 2019/11/14

N2 - Attack trees are used in cybersecurity analysis to give an analyst a view of all the ways in which an attack can be carried out. Attack trees can become large, and developing them by hand can be tedious and error-prone. In this paper the automated generation of attack trees is considered. The method proposed is based on a library of attack templates – parameterisable patterns of attacks such as denial of service or eavesdropping – and that also uses an abstract model of the networkarchitecture under attack. A pseudocode implementation of the method is also presented. The example application given is from the automotive domain and using an architecture consisting of linked CAN networks – a network configuration found in virtually every current vehicle.

AB - Attack trees are used in cybersecurity analysis to give an analyst a view of all the ways in which an attack can be carried out. Attack trees can become large, and developing them by hand can be tedious and error-prone. In this paper the automated generation of attack trees is considered. The method proposed is based on a library of attack templates – parameterisable patterns of attacks such as denial of service or eavesdropping – and that also uses an abstract model of the networkarchitecture under attack. A pseudocode implementation of the method is also presented. The example application given is from the automotive domain and using an architecture consisting of linked CAN networks – a network configuration found in virtually every current vehicle.

M3 - Paper

ER -