Asset-centric analysis and visualisation of attack trees

Schmitz, C.; Sekulla, A. and Pape, S.

In Graphical Models for Security - 7th International Workshop, GraMSec@CSF 2020, Boston, MA, USA, Virtual Conference, June 22, 2020, Revised Selected Papers, pages 45-64, Springer, LNCS 12419, 2020.

Abstract

Attack trees are an established concept in threat and risk analysis. They build the basis for numerous frameworks aiming to determine the risk of attack scenarios or to identify critical attacks or attack paths. However, existing frameworks do not provide systematic analyses on the asset-level like the probability of (un)successful attacks per asset. But these insights are important to enable decision-makers to make more informed decisions. Therefore, a generic approach is presented that extends classical attack tree approaches by asset-specific analyses. For this purpose, the attack steps in the attack trees are annotated with corresponding assets. This allows to identify the attack paths each asset is exposed to. In combination with the standard attack tree parameter 'probability of attack success' a set of complementing attack success and protection metrics can be applied on each step of the paths. Furthermore, an integrated visualisation scheme is proposed that illustrates the results in a comprehensible way so that decision-makers can intuitively understand what the metrics indicate. It also includes several features improving the usability and scalability. As a proof of concept, we have implemented a prototype of our proposed method.

PDFDOILinkLinkLinkLinkBibtexsecuritycritical infrastructurescs4e

Bibtex

@InProceedings{SSP20gramsec,
  author    = {Christopher Schmitz and Andr\'e Sekulla and Sebastian Pape},
  title     = {Asset-centric analysis and visualisation of attack trees},
  booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec@CSF 2020, Boston, MA, USA, Virtual Conference, June 22, 2020, Revised Selected Papers},
  year      = {2020},
  volume    = {12419},
  series    = {LNCS},
  pages     = {45--64},
  month     = {11},
  publisher = {Springer},
  doi       = {10.1007/978-3-030-62230-5_3},
  keywords  = {CS4E, critical infrastructures, security, security management},
  url       = {https://link.springer.com/chapter/10.1007%2F978-3-030-62230-5_3},
}

PDF