kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (3 of 3) Show all publications
Widel, W., Hacks, S., Ekstedt, M., Johnson, P. & Lagerström, R. (2023). The meta attack language-a formal description. Computers & security (Print), 130, 103284, Article ID 103284.
Open this publication in new window or tab >>The meta attack language-a formal description
Show others...
2023 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 130, p. 103284-, article id 103284Article in journal (Refereed) Published
Abstract [en]

Nowadays, IT infrastructures are involved in making innumerable aspects of our lives convenient, starting with water or energy distribution systems, and ending with e-commerce solutions and online banking services. In the worst case, cyberattacks on such infrastructures can paralyze whole states and lead to losses in terms of both human lives and money.One of the approaches to increase security of IT infrastructures relies on modeling possible ways of compromising them by potential attackers. To facilitate creation and reusability of such models, domain specific languages (DSLs) can be created. Ideally, a user will employ a DSL for modeling their infrastruc-ture of interest, with the domain-specific threats and attack logic being already encoded in the DSL by the domain experts.The Meta Attack Language (MAL) has been introduced previously as a meta-DSL for development of security-oriented DSLs. In this work, we define formally the syntax and a semantics of MAL to ease a common understanding of MAL's functionalities and enable reference implementations on different tech-nical platforms. It's applicability for modeling and analysis of security of IT infrastructures is illustrated with an example.

Place, publisher, year, edition, pages
Elsevier BV, 2023
Keywords
Threat modeling, Attack simulation, Attack graphs, Domain specific language
National Category
Reliability and Maintenance Computer Systems
Identifiers
urn:nbn:se:kth:diva-329957 (URN)10.1016/j.cose.2023.103284 (DOI)001001451200001 ()2-s2.0-85156202278 (Scopus ID)
Note

QC 20230626

Available from: 2023-06-26 Created: 2023-06-26 Last updated: 2023-06-26Bibliographically approved
Widel, W., Mukherjee, P. & Ekstedt, M. (2022). Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs. IEEE Access, 10, 89645-89662
Open this publication in new window or tab >>Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs
2022 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 89645-89662Article in journal (Refereed) Published
Abstract [en]

Connecting critical infrastructure assets to the network is absolutely essential for modern industries. In contrast to the apparent advantages, network connectivity exposes other infrastructure vulnerabilities that can be exploited by attackers. To protect the infrastructure, precise countermeasure identification is necessary. In this regard, the objective for the security officers is to identify the optimal set of countermeasures under a variety of budgetary restrictions. Our approach is based on the Meta Attack Language framework, which allows for convenient modelling of said infrastructures, as well as for automatic generation of attack graphs describing attacks against them. We formalize the problem of the selection of countermeasures in this context. The formalization makes it possible to deal with an arbitrary number of budgets, expressing available resources of both monetary and time-like nature, and to model numerous dependencies between countermeasures, including order dependencies, mutual exclusivity, and interdependent implementation costs. We propose a flexible and scalable algorithm for the problem. The whole methodology is validated in practice on realistic models.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2022
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-316948 (URN)10.1109/access.2022.3200601 (DOI)000848230900001 ()2-s2.0-85137583573 (Scopus ID)
Note

QC 20220920

Available from: 2022-09-01 Created: 2022-09-01 Last updated: 2022-09-20Bibliographically approved
Fila, B. & Widel, W. (2020). Exploiting attack-defense trees to find an optimal set of countermeasures. In: 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020): . Paper presented at 33rd IEEE Computer Security Foundations Symposium (CSF), JUN 22-25, 2020, ELECTR NETWORK (pp. 395-410). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Exploiting attack-defense trees to find an optimal set of countermeasures
2020 (English)In: 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), Institute of Electrical and Electronics Engineers (IEEE) , 2020, p. 395-410Conference paper, Published paper (Refereed)
Abstract [en]

Selecting the most pertinent countermeasures to secure a system is one of the ultimate goals of risk assessment. In this context, it is important to rely on modeling methods that the security experts are already familiar with, so that the solution can be smoothly adopted within industry. We propose a full-fledged framework, relying on attack-defense trees and integer linear programming, to find an optimal set of countermeasures. We use attack-defense trees formalized with directed acyclic graphs. This enables us to conveniently reason about attacker's actions that can contribute to several distinct attacks, and countermeasures that can block different ways of attacking. We provide a constructive way of extracting all reasonable behaviors of the two actors from such models. We then exploit this extracted information to formulate a generic solution, based on integer linear programing, to address a wide class of optimization problems. We show how to instantiate it for specific security-relevant optimization criteria. We cover deterministic and probabilistic cases. The framework has been implemented in a prototype tool, and validated in a real-life case study.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
Series
Proceedings IEEE Computer Security Foundations Symposium, ISSN 1940-1434
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-292072 (URN)10.1109/CSF49147.2020.00035 (DOI)000621174200027 ()2-s2.0-85090476400 (Scopus ID)
Conference
33rd IEEE Computer Security Foundations Symposium (CSF), JUN 22-25, 2020, ELECTR NETWORK
Note

QC 20210329

Available from: 2021-03-29 Created: 2021-03-29 Last updated: 2023-04-04Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-1680-5255

Search in DiVA

Show all publications