A review of attack graph and attack tree visual syntax in cyber security

被引:131
作者
Lallie, Harjinder Singh [1 ]
Debattista, Kurt [2 ]
Bal, Jay [2 ]
机构
[1] Univ Warwick, WMG, Cyber Secur Ctr, Coventry, W Midlands, England
[2] Univ Warwick, WMG, Coventry, W Midlands, England
关键词
Attack graph; Attack tree; Visual syntax; Cyber-attack; RISK-ASSESSMENT; MODEL CHECKING; FAULT-TREES; NETWORK; INFORMATION; COLOR; GENERATION; VULNERABILITY; FRAMEWORK; KNOWLEDGE;
D O I
10.1016/j.cosrev.2019.100219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perceiving and understanding cyber-attacks can be a difficult task, and more effective techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) - such as attack graphs, attack trees and fault trees, are a popular method of mathematically and visually representing the sequence of events that lead to a successful cyber-attack. These methods are useful visual aids that can aid cyber-attack perception. This survey paper describes the fundamental theory of cyber-attack before describing how important elements of a cyber-attack are represented in attack graphs and attack trees. The key focus of the paper is to present empirical research aimed at analysing more than 180 attack graphs and attack trees to identify how attack graphs and attack trees present cyber-attacks in terms of their visual syntax. There is little empirical or comparative research which evaluates the effectiveness of these methods. Furthermore, despite their popularity, there is no standardised attack graph visual syntax configuration, and more than seventy self-nominated attack graph and twenty attack tree configurations have been described in the literature - each of which presents attributes such as preconditions and exploits in a different way. The survey demonstrates that there is no standard method of representing attack graphs or attack trees and that more research is needed to standardise the representation. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:41
相关论文
共 432 条
[1]   CULTURAL INFLUENCES ON VISUAL SCANNING PATTERNS [J].
ABED, F .
JOURNAL OF CROSS-CULTURAL PSYCHOLOGY, 1991, 22 (04) :525-534
[2]  
Abraham Subil., 2015, INT J COMPUTER NETWO, V7
[3]   IDES - INFLUENCE DIAGRAM BASED EXPERT SYSTEM [J].
AGOGINO, AM ;
REGE, A .
MATHEMATICAL MODELLING, 1987, 8 :227-233
[4]  
Ahmed IsmailK., 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), P1
[5]  
Albanese M., 2012, Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, P1
[6]  
Albanese M, 2011, LECT NOTES COMPUT SC, V6879, P416, DOI 10.1007/978-3-642-23822-2_23
[7]  
Alberts C., 2001, TECHNICAL REPORT
[8]  
Alexander C., 1964, NOTES SYNTHESIS FORM, V5
[9]   Misuse cases: Use cases with hostile intent [J].
Alexander, I .
IEEE SOFTWARE, 2003, 20 (01) :58-+
[10]  
Alhomidi M. A., 2012, 2012 4th Computer Science and Electronic Engineering Conference (CEEC 2012). Proceedings, P83, DOI 10.1109/CEEC.2012.6375383