An Integrated Formal Description Method for Network Attacks

Hanlin Yang, Tianyu Chen, Hang Zhang, Wei Wang
{"title":"An Integrated Formal Description Method for Network Attacks","authors":"Hanlin Yang, Tianyu Chen, Hang Zhang, Wei Wang","doi":"10.1109/CCPQT56151.2022.00055","DOIUrl":null,"url":null,"abstract":"As the complexity and concealment of network attacks are increasing day by day, construction of a comprehensive and effective defense system calls for modeling and formal description of the scenes, techniques and processes of network attacks. Integrating MITRE ATT&CK and MAL (Meta Attack Language) can be a good orientation for current research on network attack description method. This paper proposes a formal description method for network attacks, in which the assets in an information system and the attackers' techniques summarized in the ATT&CK Matrix serve as the vocabulary and an extended MAL serves as the syntax. First, this method differentiates various instances of the same asset category and involves formal description of the attack scene, including the hosts, network environment and their configurations. Second, this method uses a more reasonable classification system for the assets of an information system and a more simplified set of MAL symbols. As is verified by our experiment, this method can generate a comprehensive and clear formal description for the attack scene, attack techniques and attack process of a network attack on a real-world information system, which brings the description level of this kind of integrated method from attacker strategies to network nodes, and can be a guide to defense construction for a real-world information system.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCPQT56151.2022.00055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As the complexity and concealment of network attacks are increasing day by day, construction of a comprehensive and effective defense system calls for modeling and formal description of the scenes, techniques and processes of network attacks. Integrating MITRE ATT&CK and MAL (Meta Attack Language) can be a good orientation for current research on network attack description method. This paper proposes a formal description method for network attacks, in which the assets in an information system and the attackers' techniques summarized in the ATT&CK Matrix serve as the vocabulary and an extended MAL serves as the syntax. First, this method differentiates various instances of the same asset category and involves formal description of the attack scene, including the hosts, network environment and their configurations. Second, this method uses a more reasonable classification system for the assets of an information system and a more simplified set of MAL symbols. As is verified by our experiment, this method can generate a comprehensive and clear formal description for the attack scene, attack techniques and attack process of a network attack on a real-world information system, which brings the description level of this kind of integrated method from attacker strategies to network nodes, and can be a guide to defense construction for a real-world information system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种集成的网络攻击形式化描述方法
随着网络攻击的复杂性和隐蔽性日益增加,构建全面有效的防御体系需要对网络攻击的场景、技术和过程进行建模和形式化描述。将MITRE ATT&CK与MAL (Meta攻击语言)相结合是当前网络攻击描述方法研究的一个良好方向。本文提出了一种网络攻击的形式化描述方法,该方法将ATT&CK矩阵中总结的信息系统资产和攻击者的技术作为词汇表,扩展MAL作为语法。该方法首先区分同一资产类别的各种实例,对攻击场景进行形式化描述,包括主机、网络环境及其配置。其次,该方法使用了更合理的信息系统资产分类体系和更简化的MAL符号集合。通过实验验证,该方法可以对真实信息系统的网络攻击的攻击场景、攻击技术和攻击过程进行全面清晰的形式化描述,将这种集成方法的描述层次从攻击者策略提升到网络节点,可以指导真实信息系统的防御建设。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Building a Spaceborne Integrated High-performance Processing and Computing Platform Based on SpaceVPX An Integrated Formal Description Method for Network Attacks TD3-based Algorithm for Node Selection on Multi-tier Federated Learning An Ultra-wideband Adjustable Pulse Generator Design A Multi-class image reranking algorithm based on multiple discrete-time quantum walk
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1