A Survey of Automatic Generation of Attack Trees and Attack Graphs

02/28/2023
by   Alyzia Maria Konsta, et al.
0

Graphical security models constitute a well-known, user-friendly way to represent the security of a system. These kinds of models are used by security experts to identify vulnerabilities and assess the security of a system. The manual construction of these models can be tedious, especially for large enterprises. Consequently, the research community is trying to address this issue by proposing methods for the automatic generation of such models. In this work, we present a survey illustrating the current status of the automatic generation of two kinds of graphical security models -Attack Trees and Attack Graphs. The goal of this survey is to present the current methodologies used in the field, compare them and present the challenges and future directions for the research community.

READ FULL TEXT

page 5

page 6

research
05/18/2021

Model-based Cybersecurity Analysis: Past Work and Future Directions

Model-based evaluation in cybersecurity has a long history. Attack Graph...
research
10/06/2021

A Novel Approach for Attack Tree to Attack Graph Transformation: Extended Version

Attack trees and attack graphs are both common graphical threat models u...
research
07/16/2020

A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles

Autonomous Vehicle has been transforming intelligent transportation syst...
research
08/11/2022

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

Organizations employ various adversary models in order to assess the ris...
research
03/16/2020

Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities

Vyper has been proposed as a new high-level language for Ethereum smart ...
research
10/12/2021

Datasets are not Enough: Challenges in Labeling Network Traffic

In contrast to previous surveys, the present work is not focused on revi...
research
06/24/2021

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners

Side-channel attacks extracting sensitive data from implementations have...

Please sign up or login with your details

Forgot password? Click here to reset