Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction

  title={Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction},
  author={P. Maynard and K. McLaughlin and S. Sezer},
  • P. Maynard, K. McLaughlin, S. Sezer
  • Published in ICISSP 2016
  • Computer Science
  • In this paper we identify requirements for choosing a threat modelling formalisation for modelling sophisticated malware such as Duqu 2.0. We discuss the gaps in current formalisations and propose the use of Attack Trees with Sequential Conjunction when it comes to analysing complex attacks. The paper models Duqu 2.0 based on the latest information sourced from formal and informal sources. This paper provides a well structured model which can be used for future analysis of Duqu 2.0 and related… CONTINUE READING
    6 Citations

    Figures and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
    • Peter Popov
    • Computer Science
    • 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)
    • 2017
    • 6
    • PDF
    Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System Network
    Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the ‘Hacktivist’ Threat to Critical Infrastructure
    • P. Maynard, Kieran McLaughlin
    • Computer Science, Business
    • 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
    • 2020
    Resilience of Cyber-Physical Systems
    • Francesco Flammini
    • Computer Science
    • Advanced Sciences and Technologies for Security Applications
    • 2019
    • 6
    • Highly Influenced


    Attack Trees
    • R. Ellison
    • Computer Science
    • Encyclopedia of Biometrics
    • 2009
    • 484
    • Highly Influential
    • PDF
    Security Modeling with BDMP: From Theory to Implementation
    • 17
    Attack Trees with Sequential Conjunction
    • 58
    • Highly Influential
    • PDF
    Towards Synthesis of Attack Trees for Supporting Computer-Aided Risk Analysis
    • 20
    • PDF
    Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
    • 52
    • Highly Influential
    Attack and Defense Modeling with BDMP
    • 30
    Time-Dependent Analysis of Attacks
    • 50
    • PDF
    The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems
    • 168
    • Highly Influential
    • PDF
    Modeling cyber-attack for SCADA systems using CoPNet approach
    • 9