DAG-Based Attack and Defense Modeling: Don’T Miss the Forest for the Attack Trees
Total Page:16
File Type:pdf, Size:1020Kb
COMPUTERSCIENCEREVIEW ( ) ± Available online at www.sciencedirect.com ScienceDirect journal homepage: www.elsevier.com/locate/cosrev Survey DAG-based attack and defense modeling: Don’t miss the forest for the attack trees Barbara Kordya,b,∗, Ludovic PiètreCambacédèsc, Patrick Schweitzera a University of Luxembourg, SnT, 6, rue CoudenhoveKalergi, 1359, Luxembourg b IRISA, INSA Rennes, Campus Beaulieu, 35042 Rennes, France c EDF France, Research and Development Department, 1, avenue Général de Gaulle, 92141 Clamart, France HIGHLIGHTS • We present an overview of attack and defense modeling techniques based on DAGs. • We summarize existing methodologies and compare their features. • We propose a taxonomy of the described formalisms. • We support the selection of a modeling technique depending on user requirements. • We point out future research directions in the field of graphical security modeling. ARTICLEINFO ABSTRACT Article history: This paper presents the current state of the art on attack and defense modeling approaches Received 23 May 2013 that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition Received in revised form of complex scenarios into simple, easily understandable and quantifiable actions. Methods 18 July 2014 based on threat trees and Bayesian networks are two wellknown approaches to security Accepted 20 July 2014 modeling. However there exist more than 30 DAGbased methodologies, each having different features and goals. Keywords: The objective of this survey is to summarize the existing methodologies, compare their Graphical models for security features, and propose a taxonomy of the described formalisms. This article also supports Attack trees the selection of an adequate modeling technique depending on user requirements. Bayesian networks ⃝c 2014 Elsevier Inc. All rights reserved. Attack and defense modeling Quantitative and qualitative security assessment Security measures Contents 1. Introduction .................................................................................................................................................................................2 2. Preliminaries ................................................................................................................................................................................4 ∗ Corresponding author at: University of Luxembourg, SnT 6, rue CoudenhoveKalergi, 1359, Luxembourg. Tel.: +352 4666445506. Email addresses: [email protected] (B. Kordy), ludovic.pietre[email protected] (L. PiètreCambacédès), [email protected] (P. Schweitzer). http://dx.doi.org/10.1016/j.cosrev.2014.07.001 15740137/⃝c 2014 Elsevier Inc. All rights reserved. 2 COMPUTERSCIENCEREVIEW ( ) ± 2.1. Keywords and terminology ................................................................................................................................................4 2.2. Examined aspects..............................................................................................................................................................5 2.3. Template of the formalism descriptions ............................................................................................................................5 3. Description of the formalisms ......................................................................................................................................................5 3.1. Static modeling of attacks..................................................................................................................................................5 3.1.1. Attack trees ..........................................................................................................................................................5 3.1.2. Augmented vulnerability trees .............................................................................................................................7 3.1.3. Augmented attack trees........................................................................................................................................7 3.1.4. OWA trees.............................................................................................................................................................8 3.1.5. Parallel model for multiparameter attack trees ...................................................................................................8 3.1.6. Extended fault trees .............................................................................................................................................9 3.2. Sequential modeling of attacks..........................................................................................................................................9 3.2.1. Cryptographic DAGs..............................................................................................................................................9 3.2.2. Fault trees for security..........................................................................................................................................9 3.2.3. Bayesian networks for security............................................................................................................................. 10 3.2.4. Bayesian attack graphs ......................................................................................................................................... 11 3.2.5. Compromise graphs ............................................................................................................................................. 11 3.2.6. Enhanced attack trees .......................................................................................................................................... 11 3.2.7. Vulnerability cause graphs ................................................................................................................................... 12 3.2.8. Dynamic fault trees for security ........................................................................................................................... 12 3.2.9. Serial model for multiparameter attack trees...................................................................................................... 12 3.2.10. Improved attack trees........................................................................................................................................... 13 3.2.11. Timedependent attack trees................................................................................................................................ 13 3.3. Static modeling of attacks and defenses............................................................................................................................ 13 3.3.1. Antimodels.......................................................................................................................................................... 13 3.3.2. Defense trees........................................................................................................................................................ 14 3.3.3. Protection trees .................................................................................................................................................... 14 3.3.4. Security activity graphs ........................................................................................................................................ 15 3.3.5. Attack countermeasure trees................................................................................................................................ 15 3.3.6. Attack–defense trees ............................................................................................................................................ 15 3.3.7. Countermeasure graphs ....................................................................................................................................... 16 3.4. Sequential modeling of attacks and defenses.................................................................................................................... 16 3.4.1. Insecurity flows .................................................................................................................................................... 16 3.4.2. Intrusion DAGs ..................................................................................................................................................... 17 3.4.3. Bayesian defense graphs ...................................................................................................................................... 17 3.4.4. Security goal indicator trees ................................................................................................................................. 18 3.4.5. Attack–response trees .......................................................................................................................................... 18 3.4.6. Boolean logic driven Markov process.................................................................................................................... 18 3.4.7. Cyber security modeling language........................................................................................................................ 19 3.4.8. Security goal models ............................................................................................................................................ 19