Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses

12/08/2021
by   Andrei Brazhuk, et al.
0

This works considers challenges of building and usage a formal knowledge base (model), which unites the ATT CK, CAPEC, CWE, CVE security enumerations. The proposed model can be used to learn relations between attack techniques, attack pattern, weaknesses, and vulnerabilities in order to build various threat landscapes, in particular, for threat modeling. The model is created as an ontology with freely available datasets in the OWL and RDF formats. The use of ontologies is an alternative of structural and graph based approaches to integrate the security enumerations. In this work we consider an approach of threat modeling with the data components of ATT CK based on the knowledge base and an ontology driven threat modeling framework. Also, some evaluations are made, how it can be possible to use the ontological approach of threat modeling and which challenges this can be faced.

READ FULL TEXT

page 6

page 10

research
03/20/2023

A set of semantic data flow diagrams and its security analysis based on ontologies and knowledge graphs

For a long time threat modeling was treated as a manual, complicated pro...
research
01/14/2018

Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions

Current threat models typically consider all possible ways an attacker c...
research
04/29/2020

Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure

The hacktivist threat actor is listed in many risk decision documents. Y...
research
06/29/2022

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Identification of cyber threats is one of the essential tasks for securi...
research
05/11/2020

Threat modeling framework for mobile communication systems

Due to the complex nature of mobile communication systems, most of the s...
research
05/01/2023

Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs

Security assessment relies on public information about products, vulnera...
research
12/29/2022

Identification and Verification of Attack-Tree Threat Models in Connected Vehicles

As a result of the ever-increasing application of cyber-physical compone...

Please sign up or login with your details

Forgot password? Click here to reset