skip to main content
10.1145/3230833.3232799acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

A Meta Language for Threat Modeling and Attack Simulations

Published:27 August 2018Publication History

ABSTRACT

Attack simulations may be used to assess the cyber security of systems. In such simulations, the steps taken by an attacker in order to compromise sensitive system assets are traced, and a time estimate may be computed from the initial step to the compromise of assets of interest. Attack graphs constitute a suitable formalism for the modeling of attack steps and their dependencies, allowing the subsequent simulation.

To avoid the costly proposition of building new attack graphs for each system of a given type, domain-specific attack languages may be used. These languages codify the generic attack logic of the considered domain, thus facilitating the modeling, or instantiation, of a specific system in the domain. Examples of possible cyber security domains suitable for domain-specific attack languages are generic types such as cloud systems or embedded systems but may also be highly specialized kinds, e.g. Ubuntu installations; the objects of interest as well as the attack logic will differ significantly between such domains.

In this paper, we present the Meta Attack Language (MAL), which may be used to design domain-specific attack languages such as the aforementioned. The MAL provides a formalism that allows the semi-automated generation as well as the efficient computation of very large attack graphs. We declare the formal background to MAL, define its syntax and semantics, exemplify its use with a small domain-specific language and instance model, and report on the computational performance.

References

  1. Muhammad Alam, Ruth Breu, and Michael Hafner. 2007. Model-driven security engineering for trust management in SECTET. JSW 2, 1 (2007), 47--59.Google ScholarGoogle ScholarCross RefCross Ref
  2. Mohamed Almorsy and John Grundy. 2014. Secdsvl: A domain-specific visual language to support enterprise security modelling. In Software Engineering Conference (ASWEC), 2014 23rd Australian. IEEE, 152--161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. David Basin, Manuel Clavel, and Marina Egea. 2011. A decade of model-driven security. In Proceedings of the 16th ACM symposium on Access control models and technologies. ACM, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. David Basin, Jürgen Doser, and Torsten Lodderstedt. 2006. Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology (TOSEM) 15, 1 (2006), 39--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, and Stephen Boyer. 2010. Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. In Proc. of the 7th Int. Symp. on Visualization for Cyber Security. ACM, 22--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Leandro Marques do Nascimento, Daniel Leite Viana, Paulo AM Silveira Neto, Dhiego AO Martins, Vinicius Cardoso Garcia, and Silvio RL Meira. 2012. A systematic mapping study on domain-specific languages. In Proc. 7th Int. Conf. Softw. Eng. Advances (ICSEA'12). 179--187.Google ScholarGoogle Scholar
  7. Mathias Ekstedt, Pontus Johnson, Robert Lagerström, Dan Gorton, Joakim Nydrén, and Khurram Shahzad. 2015. securiCAD by foreseeti: A CAD tool for enterprise cyber security management. In Enterprise Distributed Object Computing Workshop (EDOCW), 2015 IEEE 19th International. IEEE, 152--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Marcel Frigault, Lingyu Wang, Anoop Singhal, and Sushil Jajodia. 2008. Measuring network security using dynamic bayesian network. In Proc. of the 4th ACM workshop on Quality of protection. ACM, 23--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, Soumya K Ghosh, Anil Kumar Kaushik, and Sajal K Das. 2015. NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks. In Proc. of the 2015 Int. Conf. on Distributed Computing and Networking. ACM, 30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Michael Hafner, Ruth Breu, Berthold Agreiter, and Andrea Nowak. 2006. SECTET: an extensible framework for the realization of secure inter-organizational workflows. Internet Research 16, 5 (2006), 491--506.Google ScholarGoogle ScholarCross RefCross Ref
  11. Pawan Harish and PJ Narayanan. 2007. Accelerating large graph algorithms on the GPU using CUDA. In International conference on high-performance computing. Springer, 197--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Holm, K. Shahzad, M. Buschle, and M. Ekstedt. 2015. P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language. IEEE Transactions on Dependable and Secure Computing 12, 6 (2015), 626--639.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. John Homer, Su Zhang, Xinming Ou, David Schmidt, Yanhui Du, S Raj Rajagopalan, and Anoop Singhal. 2013. Aggregating vulnerability metrics in enterprise networks using attack graphs. Journal of Computer Security 21, 4 (2013), 561--597. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kyle Ingols, Matthew Chu, Richard Lippmann, Seth Webster, and Stephen Boyer. 2009. Modeling modern network attacks and countermeasures using attack graphs. In Computer Security Applications Conference, 2009. ACSAC'09. Annual. IEEE, 117--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, and Robert Lagerström. 2016. pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. In Availability, Reliability and Security (ARES), 2016 11th International Conference on. IEEE, 278--283.Google ScholarGoogle ScholarCross RefCross Ref
  16. Jan Jürjens. 2002. UMLsec: Extending UML for secure systems development. In International Conference on The Unified Modeling Language. Springer, 412--425. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jan Jürjens. 2005. Secure systems development with UML. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Barbara Kordy, Sjouke Mauw, Saša Radomirović, and Patrick Schweitzer. 2010. Foundations of attack--defense trees. In International Workshop on Formal Aspects in Security and Trust. Springer, 80--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Barbara Kordy, Ludovic Piètre-Cambacédès, and Patrick Schweitzer. 2014. DAG-based attack and defense modeling: Don't miss the forest for the attack trees. Computer science review 13 (2014), 1--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Igor Kotenko and Elena Doynikova. 2014. Evaluation of computer network security based on attack graphs and security event processing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 5, 3 (2014), 14--29.Google ScholarGoogle Scholar
  21. Mass Soldal Lund, Bjørnar Solhaug, and Ketil Stølen. 2010. Model-driven risk analysis: the CORAS approach. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sjouke Mauw and Martijn Oostdijk. 2005. Foundations of attack trees. In International Conference on Information Security and Cryptology. Springer, 186--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Haralambos Mouratidis, Paolo Giorgini, Gordon Manson, Ian Philp, and others. 2002. A Natural Extension of Tropos Methodology for Modelling Security. In Proceedings Agent Oriented Methodologies Workshop, Annual ACM Conference on Object Oriented Programming, Systems, Languages (OOPSLA), Seattle-USA. Citeseer.Google ScholarGoogle Scholar
  24. S. Noel, M. Elder, S. Jajodia, P. Kalapa, S. O'Hare, and K. Prole. 2009. Advances in Topological Vulnerability Analysis. In Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications Technology. 124--129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Object Management Group (OMG). 2016. Meta-Object Facility (MOF) Core Specification, Version 2.5.1. OMG Document Number: formal/2016-11-01 (http://www.omg.org/spec/MOF/2.5.1). (2016).Google ScholarGoogle Scholar
  26. Object Management Group (OMG). 2017. OMGÂő Unified Modeling LanguageÂő (OMG UMLÂő), Version 2.5.1. OMG Document Number: formal/2016-11-01 (http://www.omg.org/spec/UML/2.5.1). (2017).Google ScholarGoogle Scholar
  27. Xinming Ou, Sudhakar Govindavajhala, and Andrew W Appel. 2005. MulVAL: A Logic-based Network Security Analyzer. In USENIX security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Xinming Ou and Anoop Singhal. 2011. Attack Graph Techniques. Quantitative Security Risk Assessment of Enterprise Networks (Jan. 2011).Google ScholarGoogle ScholarCross RefCross Ref
  29. Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini. 2015. Modelling and reasoning about security requirements in socio-technical systems. Data & Knowledge Engineering 98 (2015), 123--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. N. Poolsappasit, R. Dewri, and I. Ray. 2012. Dynamic Security Risk Management Using Bayesian Attack Graphs. 9, 1 (2012), 61--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Bruce Schneier. 1999. Attack trees. Dr. DobbâĂŹs journal 24, 12 (1999), 21--29.Google ScholarGoogle Scholar
  32. Secrets Schneier. 2000. Lies: digital security in a networked world. New York, John Wiley & Sons 21 (2000), 318--333. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Teodor Sommestad, Mathias Ekstedt, and Hannes Holm. 2013. The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal 7, 3 (2013), 363--373.Google ScholarGoogle ScholarCross RefCross Ref
  34. Lingyu Wang, S. Jajodia, A. Singhal, Pengsu Cheng, and S. Noel. 2014. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. 11, 1 (2014), 30--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Leevar Williams, Richard Lippmann, and Kyle Ingols. 2008. GARNET: A graphical attack graph and reachability network evaluation tool. Springer.Google ScholarGoogle Scholar
  36. Peng Xie, Jason H Li, Xinming Ou, Peng Liu, and Renato Levy. 2010. Using Bayesian networks for cyber security analysis. In Dependable Systems and Networks (DSN), 2010 IEEE/IFIP Int. Conf. on. IEEE, 211--220.Google ScholarGoogle Scholar

Index Terms

  1. A Meta Language for Threat Modeling and Attack Simulations

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
            August 2018
            603 pages
            ISBN:9781450364485
            DOI:10.1145/3230833

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 August 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            ARES '18 Paper Acceptance Rate128of260submissions,49%Overall Acceptance Rate228of451submissions,51%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader