Toward hybrid attack dependency graphs

This extended abstract presents a set of continuous-domain extensions to the attack graph, a formalism used to model the interactions of multiple exploits and assets in a network. These extensions result in a new modeling framework called the hybrid attack dependency graph, which provides the novel capability of modeling continuous state variables and their evolution over the execution of attacks with duration.

[1]  J.G. Tront,et al.  Battery-Sensing Intrusion Protection System , 2006, 2006 IEEE Information Assurance Workshop.

[2]  John Hale,et al.  On Modeling Computer Networks for Vulnerability Analysis , 2002, DBSec.

[3]  Thomas A. Henzinger,et al.  Hybrid Automata: An Algorithmic Approach to the Specification and Verification of Hybrid Systems , 1992, Hybrid Systems.

[4]  Sushil Jajodia,et al.  Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.

[5]  Kun Chen,et al.  A Radiofrequency Identification (RFID) Temperature-Monitoring System for Extended Maintenance of Nuclear Materials Packaging , 2009 .

[6]  Report: Cyber-physical Systems Summit , .

[7]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[8]  Edward A. Lee Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .

[9]  A. Buttner,et al.  Common Platform Enumeration (CPE) - Specification , 2011 .

[10]  Sushil Jajodia,et al.  Topological analysis of network attack vulnerability , 2006, PST.

[11]  Steven J. Templeton,et al.  A requires/provides model for computer attacks , 2001, NSPW '00.

[12]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[13]  Richard P. Lippmann,et al.  An Annotated Review of Past Papers on Attack Graphs , 2005 .

[14]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[15]  Cynthia A. Phillips,et al.  A graph-based system for network-vulnerability analysis , 1998, NSPW '98.