kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Developing and validating domain specific languages for cyberattack modeling and simulations
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0001-8287-3160
2026 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

This thesis explores the potential of domain-specific languages (DSLs) to enhance the accuracy, efficiency, and expressiveness of cyberattack modeling and simulation. Motivated by the increasing sophistication of cyber threats, this work addresses the limitations of traditional modeling approaches by developing and validating two novel DSLs: one tailored for vehicular systems and another for the Information and Communications Technology (ICT) domain. These languages provide specialized vocabulary and syntax for describing attack patterns, system behaviors, and defense mechanisms concisely and straightforwardly. Through a series of experiments and case studies, this research demonstrates the effectiveness of these DSLs in capturing the complexities of real-world cyberattacks. These languages enable the automatic generation of attack graphs from system architecture models, streamlining threat identification and enhancing the alignment of security measures with established frameworks for cybersecurity professionals. This thesis contributes to the advancement of cyberattack modeling and simulation techniques, providing cybersecurity professionals with tools to express, analyze, and predict the behavior of cyberattacks.

Abstract [sv]

Denna avhandling undersöker potentialen hos domänspecifika språk (DSL) för att förbättra noggrannheten, effektiviteten och uttrycksfullheten i modellering och simulering av cyberattacker. Motiverad av den ökande sofistikeringen av cyberhot, adresserar detta arbete begränsningarna hos traditionella modelleringsmetoder genom att utveckla och validera två nya DSL:er: en skräddarsydd för fordonsystem och en annan för IKT-domänen. Dessa språk tillhandahåller specialiserad vokabulär och syntax för att beskriva attackmönster, systembeteenden och försvarsmekanismer på ett koncist och tydligt sätt. Genom en serie experiment och fallstudier visar denna forskning effektiviteten hos dessa DSL:er för att fånga komplexiteten i verkliga cyberattacker. Dessa språk möjliggör automatisk generering av attackgrafer från systemarkitekturmodeller, vilket effektiviserar hotidentifiering och förbättrar anpassningen av säkerhetsåtgärder till etablerade ramverk för cybersäkerhets-experter. Denna avhandling bidrar till utvecklingen av tekniker för modellering och simulering av cyberattacker, vilket ger cybersäkerhetsexperter verktyg för att uttrycka, analysera och förutsäga beteendet hos cyberattacker.

Place, publisher, year, edition, pages
Stockholm, Sweden: KTH Royal Institute of Technology, 2026. , p. ix, 49
Series
TRITA-EECS-AVL ; 2026:1
Keywords [en]
Domain specific languages, Attack graphs, Cyberattack modeling, Cyberattack simulations, Threat modeling
National Category
Computer Sciences
Research subject
Electrical Engineering
Identifiers
URN: urn:nbn:se:kth:diva-374288ISBN: 978-91-8106-445-2 (print)OAI: oai:DiVA.org:kth-374288DiVA, id: diva2:2022437
Public defence
2026-02-06, https://kth-se.zoom.us/j/65337054278, Kollegiesalen, Brinellvägen 8, Stockholm, 13:00 (English)
Opponent
Supervisors
Note

QC 20251217

Available from: 2025-12-18 Created: 2025-12-16 Last updated: 2026-01-12Bibliographically approved
List of papers
1. Research communities in cyber security: A comprehensive literature review
Open this publication in new window or tab >>Research communities in cyber security: A comprehensive literature review
2021 (English)In: Computer Science Review, ISSN 1574-0137, E-ISSN 1876-7745, Vol. 42, p. 100431-100431, article id 100431Article in journal (Refereed) Published
Place, publisher, year, edition, pages
Elsevier BV, 2021
Keywords
General Computer Science, Theoretical Computer Science
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-303119 (URN)10.1016/j.cosrev.2021.100431 (DOI)000707155400004 ()2-s2.0-85114841893 (Scopus ID)
Note

QC 20211103

Available from: 2021-10-06 Created: 2021-10-06 Last updated: 2025-12-16Bibliographically approved
2. VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures
Open this publication in new window or tab >>VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures
2022 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 117, article id 102705Article in journal (Refereed) Published
Abstract [en]

Attack simulations are a feasible means of assessing the cyber security of various systems. Simulations can replicate the steps taken by an attacker to compromise sensitive system assets, and the time required for the acquisition of assets of interests can be calculated. One widely accepted approach to such simulations is the modelling of attack steps and their dependencies in a formal manner using attack graphs. To reduce the effort of creating new attack graphs for each system in a given domain, one can employ domain-specific attack-modeling languages to codify common attack logic. The Meta Attack Language has been proposed as a framework for developing domain-specific attack languages. In this article, we propose vehicleLang as a domain-specific language for modeling vehicles in the context of corresponding information technology infrastructures and analyzing weaknesses related to known attacks. To model domain-specific attributes, we reviewed existing literature to develop a comprehensive language, which was then verified through a series of interviews with domain experts from the automotive industry. Specifically, a systematic literature review was performed to identify possible attacks against vehicles. The identified attacks served as a blueprint for the evaluation of vehicleLang's simulation capabilities. Finally, the language was validated using the Feigenbaum test methodology.

Place, publisher, year, edition, pages
Elsevier BV, 2022
Keywords
Domain-specific language, Cyber security, Threat modeling, Attack graphs, Vehicular security
National Category
Computer Sciences Computer Engineering Information Systems
Identifiers
urn:nbn:se:kth:diva-313033 (URN)10.1016/j.cose.2022.102705 (DOI)000793072700008 ()2-s2.0-85127355690 (Scopus ID)
Note

QC 20220601

Available from: 2022-06-01 Created: 2022-06-01 Last updated: 2025-12-16Bibliographically approved
3. Development and validation of coreLang: A threat modeling language for the ICT domain
Open this publication in new window or tab >>Development and validation of coreLang: A threat modeling language for the ICT domain
Show others...
2024 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 146, article id 104057Article in journal (Refereed) Published
Abstract [en]

ICT infrastructures are getting increasingly complex, and defending them against cyber attacks is cumbersome. As cyber threats continue to increase and expert resources are limited, organizations must find more efficient ways to evaluate their resilience and take proactive measures. Threat modeling is an excellent method of assessing the resilience of ICT systems, for example, by building Attack Graphs that illustrate an adversary's attack vectors. Previously, the Meta Attack Language (MAL) was proposed, which serves as a framework to develop Domain Specific Languages (DSLs) and generate Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes Attack Graphs to enable attack simulations and security assessments. In this work, we present the first release version of coreLang in which MITRE ATT&CK tactics and techniques are mapped onto to serve as a validation and identify strengths and weaknesses to benefit the development cycle. Our validation showed that coreLang does cover 46% of all the techniques included in the matrix, while if we additionally exclude the tactics that are intrinsically not covered by coreLang and MAL, the coverage percentage increases to 64%.

Place, publisher, year, edition, pages
Elsevier BV, 2024
Keywords
Domain specific language, Attack graphs, Cyber attack modeling, Threat modeling, ICT domain
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:kth:diva-353785 (URN)10.1016/j.cose.2024.104057 (DOI)001298046900001 ()2-s2.0-85201461410 (Scopus ID)
Note

QC 20240924

Available from: 2024-09-24 Created: 2024-09-24 Last updated: 2025-12-16Bibliographically approved
4. Empirical evaluation of a threat modeling language as a cybersecurity assessment tool
Open this publication in new window or tab >>Empirical evaluation of a threat modeling language as a cybersecurity assessment tool
2024 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 140, article id 103743Article in journal (Refereed) Published
Abstract [en]

The complexity of ICT infrastructures is continuously increasing, presenting a formidable challenge in safeguarding them against cyber attacks. In light of escalating cyber threats and limited availability of expert resources, organizations must explore more efficient approaches to assess their resilience and undertake proactive measures. Threat modeling is an effective approach for assessing the cyber resilience of ICT systems. One method is to utilize Attack Graphs, which visually represent the steps taken by adversaries during an attack. Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework for developing Domain-Specific Languages (DSLs) and generating Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes such Attack Graphs to enable attack simulations and security assessments for the generic ICT domain. Developing domain-specific languages for threat modeling and attack simulations provides a powerful approach for conducting security assessments of infrastructures. However, ensuring the correctness of these modeling languages raises a separate research question. In this study we conduct an empirical experiment aiming to falsify such a domain-specific threat modeling language. The potential inability to falsify the language through our empirical testing would lead to its corroboration, strengthening our belief in its validity within the parameters of our study. The outcomes of this approach indicated that, on average, the assessments generated by attack simulations outperformed those of human experts. Additionally, both human experts and simulations exhibited significantly superior performance compared to random guessers in their assessments. While specific human experts occasionally achieved better assessments for particular questions in the experiments, the efficiency of simulation-generated assessments surpasses that of human domain experts.

Place, publisher, year, edition, pages
Elsevier BV, 2024
Keywords
Cyber attack simulations, Cyber security, Domain experts, Domain-specific threat modeling language, Empirical language evaluation
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-343486 (URN)10.1016/j.cose.2024.103743 (DOI)001181589500001 ()2-s2.0-85184028408 (Scopus ID)
Note

QC 20240215

Available from: 2024-02-15 Created: 2024-02-15 Last updated: 2025-12-16Bibliographically approved

Open Access in DiVA

Full thesis(61851 kB)123 downloads
File information
File name FULLTEXT02.pdfFile size 61851 kBChecksum SHA-512
a782ce434baa7232aa5131c92570b8ae28915a4c4e385f6b26a88c8827ee3d258eb648406272df0ebe8c9d713b6b57e515cac542b7de38a758eb34b65dead938
Type fulltextMimetype application/pdf

Authority records

Katsikeas, Sotirios

Search in DiVA

By author/editor
Katsikeas, Sotirios
By organisation
Network and Systems Engineering
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 124 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 2143 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf