Visible to the public Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions

TitleTowards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Publication TypeConference Paper
Year of Publication2017
AuthorsAllodi, Luca, Etalle, Sandro
Conference NameProceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5203-1
Keywordsattacker capabilities, composability, Metrics, pubcrawl, Resiliency, Sybil attack, sybil attacks, threat modeling, vulnerabilities
AbstractCurrent threat models typically consider all possible ways an attacker can penetrate a system and assign probabilities to each path according to some metric (e.g. time-to-compromise). In this paper we discuss how this view hinders the realness of both technical (e.g. attack graphs) and strategic (e.g. game theory) approaches of current threat modeling, and propose to steer away by looking more carefully at attack characteristics and attacker environment. We use a toy threat model for ICS attacks to show how a realistic view of attack instances can emerge from a simple analysis of attack phases and attacker limitations.
URLhttp://doi.acm.org/10.1145/3140368.3140372
DOI10.1145/3140368.3140372
Citation Keyallodi_towards_2017