Fourth IEEE International Workshop on Information Assurance (IWIA'06)
DOI: 10.1109/iwia.2006.17
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets

Abstract: The commonly used flaw hypothesis model (FHM)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 24 publications
0
18
0
Order By: Relevance
“…The security test models are categorized into white box, gray box, and black box. White box describes the test in which the tester has the complete knowledge about the infrastructure to be tested [24,63]. Black-box, in contrast, assume that there is no prior knowledge about the environment.…”
Section: Rq3-what Are the Models Of Pentest?mentioning
confidence: 99%
“…The security test models are categorized into white box, gray box, and black box. White box describes the test in which the tester has the complete knowledge about the infrastructure to be tested [24,63]. Black-box, in contrast, assume that there is no prior knowledge about the environment.…”
Section: Rq3-what Are the Models Of Pentest?mentioning
confidence: 99%
“…Dahl and Wolthusen suggested the use of interval timed colored Petri nets where tokens carry timestamps as well as color and the firing delay of transitions are bounded by specified time intervals [31]. Their concern is timing-dependent attacks carried out by multiple attackers against possibly multiple targets.…”
Section: B Petri Netsmentioning
confidence: 99%
“…To design a penetration test in order to achieve a complete assessment, multiple conceptual solutions exist, among which the more important are Attack Trees, Attack Graphs, Petri's Network variants, etc. [12], [17], [19]. In the following section we describe the basic foundations of an Attack Tree design together with an instantiation related to an attack to SIP devices in a network.…”
Section: Writing Assessment Testsmentioning
confidence: 99%
“…In the research community, recent work on formal descriptions on how penetration tests can be accomplished ranges from modelling attack trees [19], Colored Petri Nets [12] to Attacks Graphs [17]. The major differences consist in their power of expressiveness as well as in their complexity.…”
Section: Scripting Environmentmentioning
confidence: 99%