A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version

10/06/2021
by   Nathan Daniel Schiele, et al.
0

Attack trees and attack graphs are both common graphical threat models used by organizations to better understand possible cybersecurity threats. These models have been primarily seen as separate entities, to be used and researched in entirely different contexts, but recently there has emerged a new interest in combining the strengths of these models and in transforming models from one notation into the other. The existing works in this area focus on transforming attack graphs into attack trees. In this paper, we propose an approach to transform attack trees into attack graphs based on the fundamental understanding of how actions are represented in both structures. From this, we hope to enable more versatility in both structures.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/28/2023

A Survey of Automatic Generation of Attack Trees and Attack Graphs

Graphical security models constitute a well-known, user-friendly way to ...
research
06/21/2022

Identification of Attack Paths Using Kill Chain and Attack Graphs

The ever-evolving capabilities of cyber attackers force security adminis...
research
01/21/2018

An Intuitionistic Linear Logical Semantics of SAND Attack Trees

In this paper we introduce a new logical foundation of SAND attack trees...
research
06/03/2023

Tecnicas Avanzadas de Ciberseguridad: Integracion y Evolucion de la Kill Chain en Diversos Escenarios

The document provides an in-depth analysis of the main attack chain mode...
research
11/09/2021

Attack time analysis in dynamic attack trees via integer linear programming

Attack trees are an important tool in security analysis, and an importan...
research
08/11/2022

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

Organizations employ various adversary models in order to assess the ris...
research
02/08/2022

Ontology-based Attack Graph Enrichment

Attack graphs provide a representation of possible actions that adversar...

Please sign up or login with your details

Forgot password? Click here to reset