Proceedings of the 5th International Conference on Information Systems Security and Privacy 2019
DOI: 10.5220/0007247901750182
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3
1

Relationship

6
3

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…As mentioned earlier, it is a common issue for MAL-based languages to have only a few attack steps and defenses with probability distributions (e.g., [8], [39]). Therefore, we propose a method that guides future developers to find such probabilities and assign them to MAL-based languages.…”
Section: Methods For Assigning Probability Distributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…As mentioned earlier, it is a common issue for MAL-based languages to have only a few attack steps and defenses with probability distributions (e.g., [8], [39]). Therefore, we propose a method that guides future developers to find such probabilities and assign them to MAL-based languages.…”
Section: Methods For Assigning Probability Distributionsmentioning
confidence: 99%
“…To collect information as input for the process, different sources are possible, such as performing systematic literature reviews (SLRs) (e.g., [40], [41]), interviewing experts [39], conducting studies [42], or making an estimation based on existing sources [43]. Considering SLRs, we expand their scope (see Figure 5) to include not only traditional academic publishing, such as journal papers and conference proceedings, but also online platforms such as security events (e.g., blackhat 14 ), vulnerability databases (e.g., NVD 15 ), blogs, and technical reports, since, oftentimes, the recent cyber threats are publicly disclosed online [44].…”
Section: Collect Information For Domain Under Assessmentmentioning
confidence: 99%
“…Some researchers have investigated the combined use of threat modeling and attack simulations in domains such as energy [51] and vehicular IT [27,57]. CySeMoL [45] is a cyber security modeling language for enterprise-level system architectures; P 2 CySeMoL [19], which is further development of CySeMoL, is an attack graph tool for estimating the cyber security of EAs.…”
Section: Attack Simulationsmentioning
confidence: 99%
“…So far, several languages have been built in MAL. One example is vehicleLang (Katsikeas et al 2019), which allows modeling cyber-attacks on modern vehicles. Another example is coreLang, which contains the most common IT entities and attack steps and is included in the presentation of MAL (Johnson et al 2018).…”
Section: State Of the Artmentioning
confidence: 99%