{"title":"为capec驱动的层次结构利用父级缓解和威胁","authors":"P. Engebretson, Joshua J. Pauli","doi":"10.1109/ITNG.2009.24","DOIUrl":null,"url":null,"abstract":"We propose a new attack pattern model which focuses on the re-inclusion of the “Parent Threat” and “Parent Mitigation” elements to logically group the background of each of the 101 attack patterns in the Common Attack Pattern Enumeration Classification’s (CAPEC) Release 1 dictionary. Our approach creates a graphical hierarchy for each of the attack patterns and groups them not only by Parent Threats (such as “Spoofing” and “Injection”), but also by Parent Mitigations (such as “Access Control” and “Configuration Management”). This allows individual attack patterns to be traced upward to its Parent Threat and downward to its Parent Mitigation. The Parent Threat and Parent Mitigation elements are created from the inherit findings in the CAPEC and NIST standards; we are integrating this information into our hierarchy-based attack pattern approach. The traceability from the top of the tree (Parent Threat), through the detailed elements of the attack patterns, to the roots of the tree (Parent Mitigation) introduces the CAPEC standard to audiences who are not familiar with attack patterns and allows experienced users to leverage the attacks from organized groupings that are widely accepted. There is a great amount of information in the CAPEC dictionary that we are capturing and documenting with this fan-in/fan-out approach.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies\",\"authors\":\"P. Engebretson, Joshua J. Pauli\",\"doi\":\"10.1109/ITNG.2009.24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a new attack pattern model which focuses on the re-inclusion of the “Parent Threat” and “Parent Mitigation” elements to logically group the background of each of the 101 attack patterns in the Common Attack Pattern Enumeration Classification’s (CAPEC) Release 1 dictionary. Our approach creates a graphical hierarchy for each of the attack patterns and groups them not only by Parent Threats (such as “Spoofing” and “Injection”), but also by Parent Mitigations (such as “Access Control” and “Configuration Management”). This allows individual attack patterns to be traced upward to its Parent Threat and downward to its Parent Mitigation. The Parent Threat and Parent Mitigation elements are created from the inherit findings in the CAPEC and NIST standards; we are integrating this information into our hierarchy-based attack pattern approach. The traceability from the top of the tree (Parent Threat), through the detailed elements of the attack patterns, to the roots of the tree (Parent Mitigation) introduces the CAPEC standard to audiences who are not familiar with attack patterns and allows experienced users to leverage the attacks from organized groupings that are widely accepted. There is a great amount of information in the CAPEC dictionary that we are capturing and documenting with this fan-in/fan-out approach.\",\"PeriodicalId\":347761,\"journal\":{\"name\":\"2009 Sixth International Conference on Information Technology: New Generations\",\"volume\":\"107 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Sixth International Conference on Information Technology: New Generations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNG.2009.24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Sixth International Conference on Information Technology: New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2009.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies
We propose a new attack pattern model which focuses on the re-inclusion of the “Parent Threat” and “Parent Mitigation” elements to logically group the background of each of the 101 attack patterns in the Common Attack Pattern Enumeration Classification’s (CAPEC) Release 1 dictionary. Our approach creates a graphical hierarchy for each of the attack patterns and groups them not only by Parent Threats (such as “Spoofing” and “Injection”), but also by Parent Mitigations (such as “Access Control” and “Configuration Management”). This allows individual attack patterns to be traced upward to its Parent Threat and downward to its Parent Mitigation. The Parent Threat and Parent Mitigation elements are created from the inherit findings in the CAPEC and NIST standards; we are integrating this information into our hierarchy-based attack pattern approach. The traceability from the top of the tree (Parent Threat), through the detailed elements of the attack patterns, to the roots of the tree (Parent Mitigation) introduces the CAPEC standard to audiences who are not familiar with attack patterns and allows experienced users to leverage the attacks from organized groupings that are widely accepted. There is a great amount of information in the CAPEC dictionary that we are capturing and documenting with this fan-in/fan-out approach.