Skip to main content

2024 | OriginalPaper | Buchkapitel

Automated Enrichment of Logical Attack Graphs via Formal Ontologies

verfasst von : Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia-Alfaro

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Attack graphs represent the possible actions of adversaries to attack a system. Cybersecurity experts use them to make decisions concerning remediation and recovery plans. There are different attack graph-building approaches. We focus on logical attack graphs. Networks and vulnerabilities constantly change; we propose an attack graph enrichment approach based on semantic augmentation post-processing of the logic predicates. Mapping attack graphs with alerts from a monitored system allows for confirming successful attack actions and updating according to network and vulnerability changes. The predicates get periodically updated based on attack evidence and ontology knowledge, allowing us to verify whether changes lead the attacker to the initial goals or cause further damage to the system not anticipated in the initial graphs. We illustrate our approach using a specific cyber-physical scenario affecting smart cities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Falodiya, K., Das, M.L.: Security vulnerability analysis using ontology-based attack graphs. In: 2017 14th IEEE India Council International Conference, INDICON 2017, pp. 1–5 (2018) Falodiya, K., Das, M.L.: Security vulnerability analysis using ontology-based attack graphs. In: 2017 14th IEEE India Council International Conference, INDICON 2017, pp. 1–5 (2018)
3.
Zurück zum Zitat Ghosh, N., Ghosh, S.: A planner-based approach to generate and analyze minimal attack graph. Appl. Intell. 36(2), 369–390 (2012)CrossRef Ghosh, N., Ghosh, S.: A planner-based approach to generate and analyze minimal attack graph. Appl. Intell. 36(2), 369–390 (2012)CrossRef
4.
Zurück zum Zitat Gonzalez, D., Hastings, H., Mirakhorli, M.: Automated characterization of software vulnerabilities. In: 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 135–139. IEEE (2019) Gonzalez, D., Hastings, H., Mirakhorli, M.: Automated characterization of software vulnerabilities. In: 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 135–139. IEEE (2019)
5.
Zurück zum Zitat Hu, Q., Asghar, M.R., Brownlee, N.: Measuring IPv6 DNS reconnaissance attacks and preventing them using DNS guard. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 350–361. IEEE (2018) Hu, Q., Asghar, M.R., Brownlee, N.: Measuring IPv6 DNS reconnaissance attacks and preventing them using DNS guard. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 350–361. IEEE (2018)
6.
Zurück zum Zitat Kaiser, F.K., Andris, L.J., Tennig, T.F., Iser, J.M., Wiens, M., Schultmann, F.: Cyber threat intelligence enabled automated attack incident response. In: 2022 3rd International Conference on Next Generation Computing Applications (NextComp), pp. 1–6. IEEE (2022) Kaiser, F.K., Andris, L.J., Tennig, T.F., Iser, J.M., Wiens, M., Schultmann, F.: Cyber threat intelligence enabled automated attack incident response. In: 2022 3rd International Conference on Next Generation Computing Applications (NextComp), pp. 1–6. IEEE (2022)
7.
Zurück zum Zitat Lee, J., Moon, D., Kim, I., Lee, Y.: A semantic approach to improving machine readability of a large-scale attack graph. J. Supercomput. 75(6), 3028–3045 (2019)CrossRef Lee, J., Moon, D., Kim, I., Lee, Y.: A semantic approach to improving machine readability of a large-scale attack graph. J. Supercomput. 75(6), 3028–3045 (2019)CrossRef
8.
Zurück zum Zitat Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 336–345 (2006) Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 336–345 (2006)
9.
Zurück zum Zitat Xinming, O., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security Symposium, Baltimore, MD, vol. 8, pp. 113–128 (2005) Xinming, O., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security Symposium, Baltimore, MD, vol. 8, pp. 113–128 (2005)
10.
Zurück zum Zitat Roschke, S., Cheng, F., Meinel, C.: Using vulnerability information and attack graphs for intrusion detection. In: 2010 6th International Conference on Information Assurance and Security, IAS 2010, pp. 68–73 (2010) Roschke, S., Cheng, F., Meinel, C.: Using vulnerability information and attack graphs for intrusion detection. In: 2010 6th International Conference on Information Assurance and Security, IAS 2010, pp. 68–73 (2010)
12.
Zurück zum Zitat Saint-Hilaire, K., Cuppens, F., Cuppens, N., Garcia-Alfaro, J.: Ontology-based attack graph enrichment. In: 2021 TIEMS (The International Emergency Management Society) Annual Conference, Paris, France (2021). https://arxiv.org/abs/2202.04016 Saint-Hilaire, K., Cuppens, F., Cuppens, N., Garcia-Alfaro, J.: Ontology-based attack graph enrichment. In: 2021 TIEMS (The International Emergency Management Society) Annual Conference, Paris, France (2021). https://​arxiv.​org/​abs/​2202.​04016
13.
Zurück zum Zitat Stan, O., et al.: Heuristic approach for countermeasure selection using attack graphs. In: 2021 IEEE 34th Computer Security Foundations Symposium (CSF), pp. 1–16 (2021) Stan, O., et al.: Heuristic approach for countermeasure selection using attack graphs. In: 2021 IEEE 34th Computer Security Foundations Symposium (CSF), pp. 1–16 (2021)
Metadaten
Titel
Automated Enrichment of Logical Attack Graphs via Formal Ontologies
verfasst von
Kéren Saint-Hilaire
Frédéric Cuppens
Nora Cuppens
Joaquin Garcia-Alfaro
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_5

Premium Partner