2010
DOI: 10.1007/978-3-642-16558-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Security in the GSM Radio Network Using Attack Jungles

Abstract: Abstract. In this paper we introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack jungles. The tool was used to analyze the security of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…might create new attack methods by exploiting weakness of an isolation providing system to reach resources assigned to another slice with better parameters in order to lower costs or to intercept sensitive data stream. An attack on these properties could also be a part of a more complex attack scenario (it could be the subject of an attack in the Attack Jungle concept [26]).…”
Section: Security In Sliced Networkmentioning
confidence: 99%
“…might create new attack methods by exploiting weakness of an isolation providing system to reach resources assigned to another slice with better parameters in order to lower costs or to intercept sensitive data stream. An attack on these properties could also be a part of a more complex attack scenario (it could be the subject of an attack in the Attack Jungle concept [26]).…”
Section: Security In Sliced Networkmentioning
confidence: 99%
“…by exploiting weak isolation providing system to reach resources in other slice with better parameters, lower costs or sensitive data stream. An attack on these properties could also be a part of more complex attack scenario (it could be subject to attack in the Attack Jungle concept [9]). …”
Section: B Security In a Sliced Networkmentioning
confidence: 99%
“…The example below illustrates the bottom-up procedure for an attribute called satisfiability. 1 In fact, symbols ∨ p , ∧ p , ∨ o , and ∧ o represent unranked functions, i.e., they stand for families of functions…”
Section: Definition 3 An Attribute Domain For Adterms Is a Tuplementioning
confidence: 99%
“…Most of the questions usually asked for attack trees can be adapted so that they can be answered on ADTrees as well. Thus, questions related to attributes such as attacker's/defender's costs [26,7,27,4,25,21,31,1,24,8,2,29,10], attack/defense time [12,26,29], attack detectability [27,8], attacker's special skill [21,1,26], difficulty of attack/protection [8,11,27,12,21,1,3,29], penalty [7,13,29], impact of the attack [26,27,12,19,25,21,3,1,23,10,29], attacker's profit [3,13,6,24], etc., all belong to Class 1. We analyze questions of this class in Section 4.…”
Section: Classification Of Questionsmentioning
confidence: 99%
See 1 more Smart Citation