Model-Based Generation of Attack-Fault Trees
- URL: http://arxiv.org/abs/2309.09941v1
- Date: Mon, 18 Sep 2023 16:58:36 GMT
- Title: Model-Based Generation of Attack-Fault Trees
- Authors: Raffaela Groner, Thomas Witte, Alexander Raschke, Sophie Hirn, Irdin
Pekaric, Markus Frick, Matthias Tichy and Michael Felderer
- Abstract summary: Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties.
Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to model and model-check a holistic view on both safety and security.
We present an AFT generation tool-chain that facilitates this task using partial Fault and Attack Trees that are either manually created or mined from vulnerability databases.
- Score: 40.47903652083515
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Joint safety and security analysis of cyber-physical systems is a necessary
step to correctly capture inter-dependencies between these properties.
Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack
Trees and can be used to model and model-check a holistic view on both safety
and security. Manually creating a complete AFT for the whole system is,
however, a daunting task. It needs to span multiple abstraction layers, e.g.,
abstract application architecture and data flow as well as system and library
dependencies that are affected by various vulnerabilities. We present an AFT
generation tool-chain that facilitates this task using partial Fault and Attack
Trees that are either manually created or mined from vulnerability databases.
We semi-automatically create two system models that provide the necessary
information to automatically combine these partial Fault and Attack Trees into
complete AFTs using graph transformation rules.
Related papers
- CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation [37.89720165358964]
This paper showcases CARACAS, a vehicular model, including component control via CAN messages and attack injection capabilities.
CarACAS showcases the efficacy of this methodology, including a Battery Electric Vehicle (BEV) model, and focuses on attacks targeting torque control in two distinct scenarios.
arXiv Detail & Related papers (2024-06-11T10:16:55Z) - Attack Tree Generation via Process Mining [0.0]
This work aims to provide a method for the automatic generation of Attack Trees from attack logs.
The main original feature of our approach is the use of Process Mining algorithms to synthesize Attack Trees.
Our approach is supported by a prototype that, apart from the derivation and translation of the model, provides the user with an Attack Tree in the RisQFLan format.
arXiv Detail & Related papers (2024-02-19T10:55:49Z) - Data-Agnostic Model Poisoning against Federated Learning: A Graph
Autoencoder Approach [65.2993866461477]
This paper proposes a data-agnostic, model poisoning attack on Federated Learning (FL)
The attack requires no knowledge of FL training data and achieves both effectiveness and undetectability.
Experiments show that the FL accuracy drops gradually under the proposed attack and existing defense mechanisms fail to detect it.
arXiv Detail & Related papers (2023-11-30T12:19:10Z) - Automated generation of attack trees with optimal shape and labelling [0.9833293669382975]
This article addresses the problem of automatically generating attack trees that soundly and clearly describe the ways the system can be attacked.
We introduce an attack-tree generation algorithm that minimises the tree size and the information length of its labels without sacrificing correctness.
arXiv Detail & Related papers (2023-11-22T11:52:51Z) - Serving Deep Learning Model in Relational Databases [70.53282490832189]
Serving deep learning (DL) models on relational data has become a critical requirement across diverse commercial and scientific domains.
We highlight three pivotal paradigms: The state-of-the-art DL-centric architecture offloads DL computations to dedicated DL frameworks.
The potential UDF-centric architecture encapsulates one or more tensor computations into User Defined Functions (UDFs) within the relational database management system (RDBMS)
arXiv Detail & Related papers (2023-10-07T06:01:35Z) - DepGraph: Towards Any Structural Pruning [68.40343338847664]
We study general structural pruning of arbitrary architecture like CNNs, RNNs, GNNs and Transformers.
We propose a general and fully automatic method, emphDependency Graph (DepGraph), to explicitly model the dependency between layers and comprehensively group parameters for pruning.
In this work, we extensively evaluate our method on several architectures and tasks, including ResNe(X)t, DenseNet, MobileNet and Vision transformer for images, GAT for graph, DGCNN for 3D point cloud, alongside LSTM for language, and demonstrate that, even with a
arXiv Detail & Related papers (2023-01-30T14:02:33Z) - Decoupled Multi-task Learning with Cyclical Self-Regulation for Face
Parsing [71.19528222206088]
We propose a novel Decoupled Multi-task Learning with Cyclical Self-Regulation for face parsing.
Specifically, DML-CSR designs a multi-task model which comprises face parsing, binary edge, and category edge detection.
Our method achieves the new state-of-the-art performance on the Helen, CelebA-HQ, and LapaMask datasets.
arXiv Detail & Related papers (2022-03-28T02:12:30Z) - Unveiling the potential of Graph Neural Networks for robust Intrusion
Detection [2.21481607673149]
We propose a novel Graph Neural Network (GNN) model to learn flow patterns of attacks structured as graphs.
Our model is able to maintain the same level of accuracy as in previous experiments, while state-of-the-art ML techniques degrade up to 50% their accuracy (F1-score) under adversarial attacks.
arXiv Detail & Related papers (2021-07-30T16:56:39Z) - An Automated, End-to-End Framework for Modeling Attacks From
Vulnerability Descriptions [46.40410084504383]
In order to derive a relevant attack graph, up-to-date information on known attack techniques should be represented as interaction rules.
We present a novel, end-to-end, automated framework for modeling new attack techniques from textual description of a security vulnerability.
arXiv Detail & Related papers (2020-08-10T19:27:34Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.