A review of attack graph and attack tree visual syntax in cyber security

Computer Science Review - Tập 35 - Trang 100219 - 2020
Harjinder Singh Lallie1, Kurt Debattista2, Jay Bal2
1Cyber Security Centre, WMG, University of Warwick, Coventry, UK
2WMG, University of Warwick, Coventry, UK

Tài liệu tham khảo

IBM Security, 2018 Valasek, 2015 Ehrenfeld, 2017, Wannacry, cybersecurity and health information technology: a time to act, J. Med. Syst., 41, 104, 10.1007/s10916-017-0752-1 Falliere, 2011 Coffey, 2017, Ameliorating sources of human error in cybersecurity: technological and human-centered approaches, 85 Baftiu, 2017, Cyber security in kosovo, Eur. J. Econ. Law Soc. Sci., 1 DCMS, 2017 Sasse, 2005, Usable security: why do we need it? how do we get it? Payne, 2008, A brief introduction to usable security, IEEE Internet Comput., 12, 10.1109/MIC.2008.50 Nurse, 2011, Trustworthy and effective communication of cybersecurity risks: a review, 60 CSRC, 2016 Odgers Berndtson, 2013 KPMG, 2015 Tanium, 2017 Kasemsri, 2006 Staheli, 2014, Visualization evaluation for cyber security: trends and future directions, 49 Moody, 2007, What makes a good diagram? improving the cognitive effectiveness of diagrams in is development, 481 R. Kang, L. Dabbish, N. Fruchter, S. Kiesler, My data just goes everywhere: user mental models of the internet and implications for privacy and security, in: 2015 Symposium on Usable Privacy and Security, SOUPS2015, 2015. Lallie, 2018, An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception, IEEE Trans. Inf. Forensics Secur., 13, 1110, 10.1109/TIFS.2017.2771238 Lallie, 2018, Evaluating practitioner cyber-security attack graph configuration preferences, Comput. Secur., 79, 117, 10.1016/j.cose.2018.08.005 Keller, 2005, Visualizing knowledge and information: an introduction, 1 Homer, 2008, Improving attack graph visualization through data reduction and attack grouping, 68 G. Dondossola, L. Pietre-Cambacedes, J. McDonald, M. Ekstedt, A. Torkilseng, É.d.F. RSE, Modelling of cyber attacks for assessing smart grid security, in: Proceedings Cigré D2 2011 Colloquium, 2011. Roschke, 2011, A new alert correlation algorithm based on attack graph, 58 Hogganvik, 2007 Schweitzer, 2009, Using visualization to teach security, J. Comput. Sci. Coll., 24, 143 Fink, 2009, Visualizing cyber security: usable workspaces, 45 Fithen, 2004, Formal modeling of vulnerability, Bell Labs Tech. J., 8, 173, 10.1002/bltj.10094 Heberlein, 2012 Homer, 2013, Aggregating vulnerability metrics in enterprise networks using attack graphs, J. Comput. Secur., 21, 561, 10.3233/JCS-130475 Ning, 2002, Analyzing intensive intrusion alerts via correlation, 74 Ning, 2003, Learning attack strategies from intrusion alerts, 200 P. Ning, et al. Building attack scenarios through integration of complementary alert correlation method, in: Network and Distributed System Security Symposium (NDSS) Symposium (2004), vol. 4, 2004, pp. 97–111. Ingols, 2006, Practical attack graph generation for network defense, 121 Man, 2008, A method for global attack graph generation, 236 Williams, 2007, Executive and board roles in information security, Netw. Secur., 2007, 11, 10.1016/S1353-4858(07)70073-9 Liu, 2010, Sentiment analysis and subjectivity, 627 Staniford-Chen, 1996, Grids-a graph based intrusion detection system for large networks, 361 Cuppens, 2001, Managing alerts in a multi-intrusion detection environment, 22 Ammann, 2002, Scalable, graph-based network vulnerability analysis, 217 Jha, 2002, Two formal analyses of attack graphs, 49 Braynov, 2003, Representation and analysis of coordinated attacks, 43 Cheung, 2003, Modeling multistep cyber attacks for scenario recognition, 284 Howard, 2005 Jajodia, 2005, Topological analysis of network attack vulnerability, 247 Frigault, 2008, Measuring network security using bayesian network-based attack graphs Idika, 2012, Extending attack graph-based security metrics and aggregating their application, IEEE Trans. Dependable Secure Comput., 9, 75, 10.1109/TDSC.2010.61 Ritchey, 2000, Using model checking to analyze network vulnerabilities, 156 Sindre, 2001, Templates for misuse case description Li, 2007 Wang, 2008, Implementing interactive analysis of attack graphs using relational databases, J. Comput. Secur., 16, 419, 10.3233/JCS-2008-0327 Jha, 2002 Ou, 2005, Mulval: a logic-based network security analyzer S.C. Sundaramurthy, L. Zomlot, X. Ou, Practical IDS alert correlation in the face of dynamic threats, in: Proceedings of the International Conference on Security and Management, 2011. Albanese, 2012, Time-efficient and cost-effective network hardening using attack graphs, 1 Ghosh, 2012, A planner-based approach to generate and analyze minimal attack graph, Appl. Intell., 36, 369, 10.1007/s10489-010-0266-8 Ning, 2004, Techniques and tools for analyzing intrusion alerts, ACM Trans. Inf. Syst. Secur., 7, 274, 10.1145/996943.996947 Cuppens, 2002, Alert correlation in a cooperative intrusion detection framework, 202 Alserhani, 2015, Knowledge-based model to represent security information and reason about multi-stage attacks, 482 Kotenko, 2006, Attack graph based evaluation of network security, 216 Lippmann, 2006, Validating and restoring defense in depth using attack graphs, 1 Wang, 2006, Minimum-cost network hardening using attack graphs, Comput. Commun., 29, 3812, 10.1016/j.comcom.2006.06.018 More, 2012, A knowledge-based approach to intrusion detection modeling, 75 Albanese, 2011, Scalable analysis of attack scenarios, 416 Alhomidi, 2014, Attack graph-based risk assessment and optimisation approach, Int. J. Netw. Secur. Appl., 6, 31 Aguessy, 2016 Ahmed, 2016, Security threat assessment of simultaneous multiple denial-of-service attacks in IEEE 802.22 cognitive radio networks, 1 Daley, 2002, A structural framework for modeling multi-stage network attacks, 5 Rashid, 2014 Tucci, 2017, Cyber risks in the marine transportation system, 113 Kap, 2013 Obes, 2013 M. Barrere, E.C. Lupu, Naggen: a network attack graph generation tool, in: Proceedings of the IEEE Conference on Communications and Network Security, CNS17, Las Vegas, NV USA. Gonzalez-Granadillo, 2017, Attack graph-based countermeasure selection using a stateful return on investment metric, 293 Qin, 2004, Attack plan recognition and prediction using causal networks, 370 Liu, 2010, A goal-oriented approach for modeling and analyzing attack graph, 1 LeMay, 2011, Model-based security metrics using adversary view security evaluation (advise), 191 Gorodetski, 2002, Attacks against computer network: formal grammar-based framework and simulation tool, 219 Shandilya, 2014, Use of attack graphs in security systems, J. Comput. Netw. Commun., 2014 Cuppens, 2000, LAMBDA: a language to model a database for detection of attacks, 197 Kordy, 2014, DAG-Based attack and defense modeling: don’t miss the forest for the attack trees, Comp. Sci. Rev., 13, 1 Sindre, 2005, Eliciting security requirements with misuse cases, Requir. Eng., 10, 34, 10.1007/s00766-004-0194-4 Geib, 2001, Plan recognition in intrusion detection systems, 46 E.J. Byres, M. Franz, D. Miller, The use of attack trees in assessing vulnerabilities in scada systems, in: Proceedings of the International Infrastructure Survivability Workshop, Lisbon, Portugal. R. Dantu, K. Loper, P. Kolan, Risk management using behavior based attack graphs, in: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2004, Las Vegas, NV, USA. Sudit, 2005, Situational awareness of a coordinated cyber attack, 114 Bistarelli, 2006, Strategic games on defense trees, 1 Li, 2006, An approach to model network exploitations using exploitation graphs, Simulation, 82, 523, 10.1177/0037549706072046 den Braber, 2003, The coras methodology: model-based risk assessment using UML and UP, 332 Espedalen, 2007 Holsopple, 2008, Virtual terrain: a security-based representation of a computer network A. Buoni, M. Fedrizzi, J. Mezei, A delphi-based approach to fraud detection using attack trees and fuzzy numbers, in: Proceeding of the IASK International Conferences, Seville, Spain. Ingoldsby, 2010 Karpati, 2010, Visualizing cyber attacks with misuse case maps, 262 Matrosov, 2010 J.P. Landry, J.H. Pardue, T. Johnsten, M. Campbell, P. Patidar, A threat tree for health information security and privacy, in: 17th Americas Conference on Information Systems, AMCIS 2011, 2011. Chokshi, 2012, Efficient generation of exploit dependency graph by customized attack modeling technique, 39 B. Han, Q. Wang, F. Yu, X. Zhang, A vulnerability attack graph generation method based on scripts, in: 3rd International Conference on Information Computing and Applications, ICICA2012, 2012, pp. 45–50. Wang, 2012, Which strategy is better to restrain C&C activities of unstructured p2p botnets?, J. Converg. Inf. Technol., 7 Aslanyan, 2013, Comparative analysis of attack graphs, Math. Probl. Comput. Sci., 40, 85 Buldas, 2013, New efficient utility upper bounds for the fully adaptive model of attack trees, 192 Kotenko, 2013, A cyber attack modeling and impact assessment framework, 1 Marback, 2013, A threat model-based approach to security testing, Softw. - Pract. Exp., 43, 241, 10.1002/spe.2111 Borges, 2014 Herr, 2014, Prep: a framework for malware and cyber weapons, 84 Elkind, 2015 Kaynar, 2016, Distributed attack graph generation, IEEE Trans. Dependable Secure Comput., 13, 519, 10.1109/TDSC.2015.2423682 Lee, 2016 Mæhre, 2005 Baybutt, 2003, Cyber security vulnerability analysis: an asset-based approach, Process Saf. Prog., 22, 220, 10.1002/prs.680220408 Fisk, 2012, Cyber security, building automation, and the intelligent building, Intell. Build. Int., 4, 169, 10.1080/17508975.2012.695277 Sales, 2012, Regulating cyber-security, Northwest. Univ. Law Rev., 107, 1503 Harrington, 2014, Cyber security active defense: playing with fire or sound risk management, Richmond J. Law Technol., 20, 12 Brooke, 2003, Fault trees for security system design and analysis, Comput. Secur., 22, 256, 10.1016/S0167-4048(03)00313-4 Matulevičius, 2007, Visually effective goal models using kaos, 265 K.K. Fletcher, X. Liu, Security requirements analysis, specification, prioritization and policy development in cyber-physical systems, in: 5th International Conference on Secure Software Integration & Reliability Improvement Companion, SSIRI-C-2011, pp. 106–113. Karpati, 2014, Comparing attack trees and misuse cases in an industrial setting, Inf. Softw. Technol., 56, 294, 10.1016/j.infsof.2013.10.004 Daly, 2009, Advanced persistent threat, Usenix, Nov., 4, 2013 Kerr, 2005, Virtual crime, virtual deterrence: a skeptical view of self-help, architecture, and civil liability, J. Law Econ. Policy, 1, 197 Maughan, 2010, The need for a national cybersecurity research and development agenda, Commun. ACM, 53, 29, 10.1145/1646353.1646365 Wall, 2013, Enemies within: redefining the insider threat in organizational security policy, Secur. J., 26, 107, 10.1057/sj.2012.1 Kent, 2016, Cyber security data sources for dynamic network research, 37 Wu, 2006, Adversarial organization modeling for network attack/defense, 90 Moody, 2010, The “physics” of notations: a scientific approach to designing visual notations in software engineering, 485 Scott, 1994, Images in advertising: the need for a theory of visual rhetoric, J. Consum. Res., 21, 252, 10.1086/209396 Kress, 1996 IEC, 1990 Peterson, 1977, Petri nets, ACM Comput. Surv., 9, 223, 10.1145/356698.356702 Dalton, 2006, Analyzing attack trees using generalized stochastic petri nets, 116 Mauw, 2006, Foundations of attack trees, 186 Alexander, 1964 Moody, 2005, Theoretical and practical issues in evaluating the quality of conceptual models: current state and future directions, Data Knowl. Eng., 55, 243, 10.1016/j.datak.2004.12.005 Byres, 2011 Chandra, 2014 Du, 2016 Boston University, 2015 Sanchez, 2015 Vlajic, 2015 Radiflow, 2016 R. Shirey, Internet security glossary, RFC 2828, RFC Editor. Phillips, 1998, A graph-based system for network-vulnerability analysis, 71 Alhomidi, 2012, Attack graphs representations, 83 Jun-chun, 2011, A minimum cost of network hardening model based on attack graphs, Procedia Eng., 15, 3227, 10.1016/j.proeng.2011.08.606 Barik, 2014, A graph data model for attack graph generation and analysis, 239 Swiler, 2001, Computer-attack graph generation tool, 307 Taylor, 2014, Understanding the security of interoperable medical devices using attack graphs, 31 Sommestad, 2008, Combining defense graphs and enterprise architecture models for security analysis, 349 D. Byers, S. Ardi, N. Shahmehri, C. Duma, Modeling software vulnerabilities with vulnerability cause graphs, in: Proceedings of the International Conference on Software Maintenance, 2006. Foo, 2005, ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment, 508 Barik, 2011, A novel approach to collaborative security using attack graph, 1 Dawkins, 2004, A systematic approach to multi-stage network attack analysis, 48 Sheyner, 2004, Tools for generating and analyzing attack graphs, 344 Lee, 2009, Scalable attack graph for risk assessment, 1 Noel, 2005, Understanding complex network attack graphs through clustered adjacency matrices, 10 Zhu, 2006, Alert correlation for extracting attack strategies, Int. J. Netw. Secur., 3, 244 Abraham, 2015, A predictive framework for cyber security analytics using attack graphs, Int. J. Comput. Netw. Commun., 7, 1, 10.5121/ijcnc.2015.7101 GhasemiGol, 2016, A comprehensive approach for network attack forecasting, Comput. Secur., 58, 83, 10.1016/j.cose.2015.11.005 Johnson, 2016, Pwnpr3d: an attack-graph-driven probabilistic threat-modeling approach, 278 Nanda, 2007, A highly scalable model for network attack identification and path prediction, 663 Bi, 2016, K maximum probability attack paths dynamic generation algorithm, Comput. Sci. Inf. Syst., 13, 677, 10.2298/CSIS160227022B Gao, 2018, Exploring attack graphs for security risk assessment: a probabilistic approach, Wuhan Univ. J. Nat. Sci., 23, 171, 10.1007/s11859-018-1307-0 Murphy, 2010, Clustering of multistage cyber attacks using significant services, 1 Long, 2009 Schuppenies, 2009 Alserhani, 2010, MARS: multi-stage attack recognition system, 753 Chen, 2010, A scalable approach to analyzing network security using compact attack graph, J. Netw., 5, 543 Jajodia, 2010 Sheyner, 2002, Automated generation and analysis of attack graphs, 273 Noel, 2008, Optimal ids sensor placement and alert prioritization using attack graphs, J. Netw. Syst. Manage., 16, 259, 10.1007/s10922-008-9109-x Li, 2016, The optimized attribute attack graph based on apt attack stage model, 2781 Nguyen, 2017, Multi-stage attack graph security games: heuristic strategies, with empirical game-theoretic analysis, 87 Templeton, 2001, A requires/provides model for computer attacks, 31 Sawilla, 2008, Identifying critical attack assets in dependency attack graphs, 18 Hariri, 2003, Impact analysis of faults and attacks in large-scale networks, IEEE Secur. Priv., 99, 49, 10.1109/MSECP.2003.1236235 Pokhrel, 2017, Cybersecurity: a stochastic predictive model to determine overall network security risk using markovian process, J. Inf. Secur., 8, 91 Almohri, 2016, Security optimization of dynamic networks with probabilistic graph modeling and linear programming, IEEE Trans. Dependable Secure Comput., 13, 474, 10.1109/TDSC.2015.2411264 Mehta, 2006, Ranking attack graphs, 127 Artz, 2002 Madan, 2004, Security modeling and quantification of intrusion tolerant systems using attack-response graph, J. High Speed Netw., 13, 297 Schneier, 1999, Attack trees, Dr. Dobb’s J., 24, 21 Baker, 2012 Scully, 2014, The cyber security threat stops in the boardroom, J. Bus. Contin. Emergency Plan., 7, 138 Alexander, 2003, Misuse cases: use cases with hostile intent, IEEE Softw., 20, 58, 10.1109/MS.2003.1159030 Matulevicius, 2008, Alignment of misuse cases with security risk management, 1397 Whittle, 2008, Executable misuse cases for modeling security concerns, 121 Opdahl, 2009, Experimental comparison of attack trees and misuse cases for security threat identification, Inf. Softw. Technol., 51, 916, 10.1016/j.infsof.2008.05.013 Tøndel, 2010, Combining misuse cases with attack trees and security activity models, 438 Katta, 2010, Comparing two techniques for intrusion visualization, 1 Firesmith, 2003, Security use cases, J. Object Technol., 2, 10.5381/jot.2003.2.3.c6 Raptis, 2002, The coras approach for model-based risk management applied to e-commerce domain, 169 Y. Stamatiou, E. Skipenes, E. Henriksen, N. Stathiakis, A. Sikianakis, E. Charalambous, N. Antonakis, K. Stølen, F. den Braber, M.S. Lund, et al. The CORAS approach for model-based risk management applied to a telemedicine service, in: Proceedings of Medical Informatics Europe, MIE2003. Dahl, 2007 Beckers, 2014, Determining the probability of smart grid attacks by combining attack tree and attack graph analysis, 30 Caltagirone, 2013 Kotheimer, 2016 Hutchins, 2011, Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains, Leading Issues in Information Warfare & Security Research, 1, 80 Mihai, 2014, Cyber kill chain analysis, Int. J. Inf. Secur. Cybercrime, 3, 37 Hahn, 2015, A multi-layered and kill-chain based security analysis framework for cyber-physical systems, Int. J. Crit. Infrastruct. Prot., 11, 39, 10.1016/j.ijcip.2015.08.003 Kontio, 1997 Kontio, 1998 Freimut, 2001, An industrial case study of implementing software risk management, 277 Kaplan, 1982, Matrix theory formalism for event tree analysis: application to nuclear-risk analysis, Risk Anal., 2, 9, 10.1111/j.1539-6924.1982.tb01398.x Alberts, 2001 Choo, 2014, A cloud security risk-management strategy, IEEE Cloud Comput., 1, 52, 10.1109/MCC.2014.27 J. Van den Berg, J. van Zoggel, M. Snels, M. van Leeuwen, S. Boeke, L. van de Koppen, J. van der Lubbe, B. van den Berg, T. de Bos, On (the emergence of) cyber security science and its challenges for cyber security education, in: Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium, 2014, pp. 13–14. Bialas, 2015, Critical infrastructures risk manager–the basic requirements elaboration, 11 Levy, 2016, Economic disruptions, business continuity planning and disaster forensic analysis: the hawaii business recovery center (hibrc) project, 315 Shachter, 1986, Evaluating influence diagrams, Oper. Res., 34, 871, 10.1287/opre.34.6.871 Agogino, 1987, IDES: influence diagram based expert system, Math. Model., 8, 227, 10.1016/0270-0255(87)90579-3 Sanner, 2010 Ekstedt, 2009, Enterprise architecture models for cyber security analysis, 1 Lagerström, 2007, Extended influence diagram generation, 599 Sommestad, 2009, Cyber security risks assessment with bayesian defense graphs and architectural models, 1 Bistarelli, 2006, Defense trees for economic evaluation of security investments, 8 Ou, 2006, A scalable approach to attack graph generation, 336 Chen, 2009, A scalable approach to full attack graphs generation, 150 Schneier, 2000 Trudeau, 2013 Bhattacharya, 2008, A scalable representation towards attack graph generation, 1 K. Durkota, V. Lisỳ, B. Bošanskỳ, C. Kiekintveld, Optimal network security hardening using attack graph games, in: Proceedings of the 24th International Conference on Artificial Intelligence, IJCAI, 2015, pp. 7–14. Ghosh, 2009, An intelligent technique for generating minimal attack graph Cheng, 2010, Compressing attack graphs through reference encoding, 1026 Dacier, 1996, Models and tools for quantitative assessment of operational security, 177 Feng, 2008, A flexible approach to measuring network security using attack graphs, 426 Hewett, 2008, Host-centric model checking for network vulnerability analysis, 225 Hong, 2012, HARMS: hierarchical attack representation models for network security analysis Khaitan, 2011, Finding optimal attack path using attack graphs: a survey, Int. J. Soft Comput. Eng., 1, 2231 Chen, 2011, Fractional factorial designs, 299 Ingols, 2009, Modeling modern network attacks and countermeasures using attack graphs, 117 Sabaliauskaite, 2015, Aligning cyber-physical system safety and security, 41 Noel, 2004, Managing attack graph complexity through visual hierarchical aggregation, 109 Higuero, 2005, Application of ‘attack trees’ in security analysis of digital contents e-commerce protocols with copyright protection, 57 Patel, 2008, Quantitatively assessing the vulnerability of critical information systems: a new method for evaluating security enhancements, Int. J. Inf. Manage., 28, 483, 10.1016/j.ijinfomgt.2008.01.009 Ralston, 2007, Cyber security risk assessment for SCADA and DCS networks, ISA Trans., 46, 583, 10.1016/j.isatra.2007.04.003 E. Tanu, J. Arreymbi, An examination of the security implications of the supervisory control and data acquisition (scada) system in a mobile networked environment: an augmented vulnerability tree approach, in: Proceedings of the 5th Annual Conference on Advances in Computing and Technology, AC&T, 2010, pp. 228–242. Steffan, 2002, Collaborative attack modeling, 253 Xie, 2009, Evaluating network security with two-layer attack graphs, 127 J.D. Weiss, A system security engineering process, in: Proceedings of the 14th National Computer Security Conference, vol. 249, 1991, pp. 572–581. Opel, 2005 Mirembe, 2008, Threat modeling revisited: improving expressiveness of attack, 93 Bortot, 2011 Wang, 2011, Exploring the network structure and nodal centrality of China’s air transport network: a complex network approach, J. Transp. Geogr., 19, 712, 10.1016/j.jtrangeo.2010.08.012 Bagnato, 2012, Attribute decoration of attack–defense trees, Int. J. Secure Softw. Eng., 3, 1, 10.4018/jsse.2012040101 Vigo, 2014, Automated generation of attack trees, 337 Salter, 1998, Toward a secure system engineering methodolgy, 2 US Nuclear Safety Commission, 1975 Amoroso, 1994 Amor, 2004, Naive bayes vs decision trees in intrusion detection systems, 420 Livadas, 2006, Using machine learning technliques to identify botnet traffic, 967 Fette, 2007, Learning to detect phishing emails, 649 Roberts, 1981 . ECSS, Fault Tree Analysis - Adoption Notice ECSS/IEC 61025, 1997. . BSI, BS EN 61025:2007 - fault tree analysis, 2007. Vesely, 2002 Cheng, 2013, Application of fault tree analysis to assess inventory risk: a practical case from aerospace manufacturing, Int. J. Prod. Res., 51, 6499, 10.1080/00207543.2013.825744 Kornecki, 2013, Fault tree analysis for safety/security verification in aviation software, Electronics, 2, 41, 10.3390/electronics2010041 Senol, 2015, Fault tree analysis of chemical cargo contamination by using fuzzy approach, Expert Syst. Appl., 42, 5232, 10.1016/j.eswa.2015.02.027 Lambert, 2003 Campean, 2008 Dugan, 1992, Dynamic fault-tree models for fault-tolerant computer systems, IEEE Trans. Reliab., 41, 363, 10.1109/24.159800 Manian, 1998, Combining various solution techniques for dynamic fault tree analysis of computer systems, 21 Sahner, 2012 Masera, 2009, Integrating cyber attacks within fault trees, Reliab. Eng. Syst. Saf., 94, 1394, 10.1016/j.ress.2009.02.020 Khand, 2009, System level security modeling using attack trees, 1 Wang, 2008, Betweenness centrality in a weighted network, Phys. Rev. E, 77, 046105, 10.1103/PhysRevE.77.046105 Dacier, 1994 Dacier, 1994, Privilege graph: an extension to the typed access matrix model, 319 IBM DeveloperWorks, 2016 . SANS, Malware FAQ: Sadmind/IIS Worm, Web page, SANS, 2016. http://uk.sans.org/security-resources/malwarefaq/sadmind_iis.php. Sheyner, 2004 Lippmann, 2005 Liu, 2005, Location awareness in unstructured peer-to-peer systems, IEEE Trans. Parallel Distrib. Syst., 163 Noel, 2005, Multiple coordinated views for network attack graphs, 99 Zhang, 2005, An effective method to generate attack graph, 3926 Wang, 2006, Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts, Comput. Commun., 29, 2917, 10.1016/j.comcom.2006.04.001 Sawilla, 2007 Wang, 2007, Measuring the overall security of network configurations using attack graphs, 98 Xie, 2009, A probability-based approach to attack graphs generation, 343 Zhong, 2009, Automatic generation of host-based network attack graph, 93 Ma, 2010, A scalable, bidirectional-based search strategy to generate attack graphs, 2976 Noel, 2010, Measuring security risk of networks using attack graphs, Int. J. Next-generation Comput., 1, 135 Ou, 2011, Attack graph techniques, 5 Keramati, 2013, CVSS-Based security metrics for quantitative analysis of attack graphs, 178 Kotenko, 2014, Fast network attack modeling and security evaluation based on attack graphs, J. Cyber Secur. Mobility, 3, 27, 10.13052/jcsm2245-1439.312 Nandi, 2016, Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender–attacker model, Comput. Oper. Res., 75, 118, 10.1016/j.cor.2016.05.005 Wu, 2016, A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities, IEEE Access, 4, 416, 10.1109/ACCESS.2016.2517321 Zhang, 2016, Generation of cyber-security reinforcement strategies for smart grid based on the attribute-based attack graph, J. Power Technol., 96, 170 Bates, 2017, Transparent web service auditing via network provenance functions, 887 Bopche, 2017, Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks, Comput. Secur., 64, 16, 10.1016/j.cose.2016.09.010 Jabbar, 2017, Diversity-aware, cost-effective network security hardening using attack graph, 1 P. Luckett, J. McDonald, W.B. Glisson, Attack-graph threat modeling assessment of ambulatory medical devices, in: Hawaii International Conference on System Sciences, HICSS-50, 2017. Sen, 2017, Risk assessment in a sensor cloud framework using attack graphs, IEEE Trans. Serv. Comput., 10, 942, 10.1109/TSC.2016.2544307 Sun, 2017, Network security risk assessment system based on attack graph and markov chain, 910, 012005 Zheng, 2017, A quantitative method for evaluating network security based on attack graph, 349 Cheng, 2011, Infotainment and road safety service support in vehicular networking: from a communication perspective, Mech. Syst. Signal Process., 25, 2020, 10.1016/j.ymssp.2010.11.009 Noel, 2004, Correlating intrusion events and building attack scenarios through attack graph distances, 350 Urbanska, 2013, Accepting the inevitable: factoring the user into home computer security, 325 Mukherjee, 2017 Qian, 2017, Social network de-anonymization and privacy inference with knowledge graph model, IEEE Trans. Dependable Secure Comput. Sun, 2017, Towards actionable mission impact assessment in the context of cloud computing, 259 Sgandurra, 2017, Efficient attack graph analysis through approximate inference, ACM Trans. Priv. Secur., 20, 10 R.P. Lippmann, K.W. Ingols, K.J. Piwowarski, Generating a Multiple-prerequisite Attack Graph, US Patent 7,971,252, 2011. Wang, 2008, A graph based approach toward network forensics analysis, ACM Trans. Inf. Syst. Secur., 12, 4, 10.1145/1410234.1410238 Saha, 2008, Extending logical attack graphs for efficient vulnerability analysis, 63 Zhang, 2012, Boosting logical attack graph for efficient security control, 218 Kumar, 2016, Evaluation of network risk using attack graph based security metrics, 91 Prasad, 2016, Generation and risk analysis of network attack graph, 507 Lippmann, 2000, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, 12 S. Noel, S. Jajodia, Attack graphs for sensor placement, alert prioritization, and attack response, in: Cyberspace Research Workshop, 2007, pp. 1–8. Noel, 2009 Ortalo, 1999, Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Trans. Softw. Eng., 25, 633, 10.1109/32.815323 Liu, 2007, Properties for security measures of software products, Appl. Math. Inf. Sci. J., 1, 129 Noel, 2003, Efficient minimum-cost network hardening via exploit dependency graphs, 86 Barik, 2016, Attack graph generation and analysis techniques, Defence Sci. J., 66, 559, 10.14429/dsj.66.10795 Chaufette, 2007 Bertin, 1983 Miller, 1956, The magic number seven plus or minus two: some limits on our capacity for processing information, Psychol. Rev., 63, 91, 10.1037/h0043158 Petre, 1995, Why looking isn’t always seeing: readership skills and graphical programming, Commun. ACM, 38, 33, 10.1145/203241.203251 Wertheimer, 1923, A brief introduction to gestalt, identifying key theories and principles, Psychol. Forsch., 4, 301, 10.1007/BF00410640 Hogganvik, 2007 den Braber, 2007, Model-based security analysis in seven steps - a guided tour to the coras method, BT Technol. J., 25, 101, 10.1007/s10550-007-0013-9 Sendi, 2016, Dynamic optimal countermeasure selection for intrusion response system, IEEE Trans. Dependable Secure Comput., 15, 755, 10.1109/TDSC.2016.2615622 Dewri, 2007, Optimal security hardening using multi-objective optimization on attack tree models of networks, 204 Miller, 1994, The magical number seven, plus or minus two: some limits on our capacity for processing information., Psychol. Rev., 101, 343, 10.1037/0033-295X.101.2.343 Rumbaugh, 2004 McLean, 2012, Computer programming in the creative arts, 235 Genon, 2010, Analysing the cognitive effectiveness of the Bpmn 2.0 visual notation, 377 Palmer, 1994, Rethinking perceptual organization: the role of uniform connectedness, Psychon. Bull. Rev., 1, 29, 10.3758/BF03200760 Wiegmann, 1992, Effects of knowledge map characteristics on information processing, Contemp. Educ. Psychol., 17, 136, 10.1016/0361-476X(92)90055-4 Smith, 1964, Color versus shape coding in information displays., J. Appl. Psychol., 48, 137, 10.1037/h0045919 Winn, 1993, An account of how readers search for information in diagrams, Contemp. Educ. Psychol., 18, 162, 10.1006/ceps.1993.1016 Störrle, 2013, Towards an operationalization of the “physics of notations” for the analysis of visual languages, 104 Gane, 1979 De Marco, 1979, Structure analysis and system specification, 255 De Marco, 2002, Structured analysis and system specification, 529 Koffka, 2013 El Kouhen, 2015, On the semantic transparency of visual notations: experiments with UML, 122 Karpati, 2011, Experimental comparison of misuse case maps with misuse cases and system architecture diagrams for eliciting security vulnerabilities and mitigations, 507 Caire, 2013, Visual notation design 2.0: towards user comprehensible requirements engineering notations, 115 Genon, 2010, Analysing the cognitive effectiveness of the ucm visual notation, 221 Masri, 2008, Using iconic graphics in entity-relationship diagrams: the impact on understanding, J. Database Manag., 19, 22, 10.4018/jdm.2008070102 Norman, 1988, The design of everyday things, Psychol. Everyday Things, 20 Lemon, 2000, Constraint matching for diagram design: qualitative visual languages, 74 Cheng, 2001, Cognitive science approaches to understanding diagrammatic representations, 79 Koedinger, 1990, Abstract planning and perceptual chunks: elements of expertise in geometry, Cogn. Sci., 14, 511, 10.1207/s15516709cog1404_2 Halpin, 2005 Barker, 1990 M.H. Diallo, J. Romero-Mariona, S.E. Sim, T.A. Alspaugh, D.J. Richardson, A comparative evaluation of three approaches to specifying security requirements, in: 12th Working Conference on Requirements Engineering: Foundation for Software Quality, RefsQ’06, 2006. Buyens, 2007, Empirical and statistical analysis of risk analysis-driven techniques for threat management, 1034 Stålhane, 2007, A comparison of two approaches to safety analysis based on use cases, 423 O. Flåten, M.S. Lund, How good are attack trees for modelling advanced cyber threats? in: Proceedings of the Norwegian Information Security Conference 2014, 2014. Hogganvik, 2005, On the comprehension of security risk scenarios, 115 Hogganvik, 2006, A graphical approach to risk identification, motivated by empirical investigations, 574 Davis, 1985 Abed, 1991, Cultural influences on visual scanning patterns, J. Cross-Cult. Psychol., 22, 525, 10.1177/0022022191224006 Chokron, 2000, Reading habits influence aesthetic preference, Cogn. Brain Res., 10, 45, 10.1016/S0926-6410(00)00021-5 Ishii, 2011, Lateral biases and reading direction: a dissociation between aesthetic preference and line bisection, Brain Cogn., 75, 242, 10.1016/j.bandc.2010.12.005 ISO, 1985 Bresciani, 2004, Tropos: an agent-oriented software development methodology, Auton. Agents Multi-Agent Syst., 8, 203, 10.1023/B:AGNT.0000018806.20944.ef Fonseca Casas, 2013, Definition of virtual reality simulation models using specification and description language diagrams, vol. 7916, 258 J. Kontio, V.R. Basili, Risk knowledge capture in the riskit method, in: SEW Proceedings, SEL-96-002, University of Maryland, 1996. B.M. Michelson, Event-driven architecture overview, 2006. Parondzhanov, 1995, Visual syntax of the drakon language, Program. Comput. Softw., 21 Omojola, 2016, Using symbols and shapes for analysis in small focus group research, Qual. Rep., 21, 832 Gorn, 2004, Waiting for the web: how screen color affects time perception, J. Mark. Res., 41, 215, 10.1509/jmkr.41.2.215.28668 Benbasat, 1986, An experimental program investigating color-enhanced and graphical information presentation: an integration of the findings, Commun. ACM, 29, 1094, 10.1145/7538.7545 Ghinea, 2005, Quality of perception: user quality of service in multimedia presentations, IEEE Trans. Multimed., 7, 786, 10.1109/TMM.2005.850960 Xin, 2004, Cross-regional comparison of colour emotions part ii: qualitative analysis, Color Res. Appl., 29, 458, 10.1002/col.20063 Xin, 2004, Cross-regional comparison of colour emotions part i: quantitative analysis, Color Res. Appl., 29, 451, 10.1002/col.20062 Kliger, 2012, Red light, green light: color priming in financial decisions, J. Socio-econ., 41, 738, 10.1016/j.socec.2012.07.003 Chan, 2009, Perceptions of implied hazard for visual and auditory alerting signals, Saf. Sci., 47, 346, 10.1016/j.ssci.2008.06.003 Zedda, 2013, Road signs: walking among shapes and colors, Int. J. Res. Eng. Technol., 2, 568, 10.15623/ijret.2013.0210089 Rodriguez, 1991, What makes a warning label salient?, 1029 Colour Blind Awareness, 2018 Ware, 2012 Kosslyn, 1989, Understanding charts and graphs, Appl. Cogn. Psychol., 3, 185, 10.1002/acp.2350030302 Mayer, 1989, Models for understanding, Review of Educational Research, 59, 43, 10.3102/00346543059001043 T.R. Green, Cognitive dimensions of notations, in: Proceedings of the 5th Conference of the British Computer Society, 1989, pp. 443–460. Schuette, 1998, The guidelines of modeling–an approach to enhance the quality in information models, 240 Krogstie, 2006, Process models representing knowledge for action: a revised quality framework, Eur. J. Inf. Syst., 15, 91, 10.1057/palgrave.ejis.3000598 Sweller, 1988, Cognitive load during problem solving: effects on learning, Cogn. Sci., 12, 257, 10.1207/s15516709cog1202_4 Sweller, 1994, Why some material is difficult to learn, Cogn. Instr., 12, 185, 10.1207/s1532690xci1203_1 Moody, 2010, Visual syntax does matter: improving the cognitive effectiveness of the i* visual notation, Requir. Eng., 15, 141, 10.1007/s00766-010-0100-1 Moody, 2008, Evaluating the visual syntax of uml: an analysis of the cognitive effectiveness of the uml family of diagrams, 16 Li, 2006, Cluster security research involving the modeling of network exploitations using exploitation graphs, 26 Xie, 2009, A new method to generate attack graphs, 401 Edge, 2006, Using attack and protection trees to analyze threats and defenses to homeland security, 1 Edge, 2007 Roy, 2010, Cyber security analysis using attack countermeasure trees, 28 Roy, 2012, Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Secur. Commun. Netw., 5, 929, 10.1002/sec.299 Roy, 2012, Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees, 1 Dai, 2015, Exploring risk flow attack graph for security risk assessment, IET Inf. Secur., 9, 344, 10.1049/iet-ifs.2014.0272 Ning, 2008, Design and application of penetration attack tree model oriented to attack resistance test, 622 F. Arnold, H. Hermanns, R. Pulungan, M. Stoelinga, Time-dependent analysis of attacks, in: Third International Conference, POST2014, vol. 14, 2014, pp. 285–305. Arnold, 2015, Sequential and parallel attack tree modelling, 291 Buldas, 2006, Rational choice of security measures via multi-parameter attack trees, Lecture Notes in Comput. Sci., 4347, 235, 10.1007/11962977_19 Buldas, 2012, Upper bounds for adversaries utility in attack trees, 98 Gadyatskaya, 2016, Attack trees for practical security assessment: ranking of attack scenarios with adtool 2.0, 159 Helmer, 2002, A software fault tree approach to requirements analysis of an intrusion detection system, Requir. Eng., 7, 207, 10.1007/s007660200016 Hong, 2013, Performance analysis of scalable attack representation models, 330 Jhawar, 2015, Attack trees with sequential conjunction, 339 Karppinen, 2007 Kordy, 2010, Attack–defense trees and two-player binary zero-sum extensive form games are equivalent, 245 Mishra, 2012, Multi tree view of complex attack–stuxnet, 171 Morakis, 2003, Measuring vulnerabilities and their exploitation cycle, Inf. Secur. Tech. Rep., 8, 45, 10.1016/S1363-4127(03)00006-2 Niitsoo, 2010, Optimal adversary behavior for the serial model of financial attack trees., 354 Pardue, 2010, Towards internet voting security: a threat tree for risk assessment, 1 G.-Y. Park, C.K. Lee, J.G. Choi, D.H. Kim, Y.J. Lee, K.-C. Kwon, Cyber security analysis by attack trees for a reactor protection system, in: Proceedings of the Korean Nuclear Society (KNS) Fall Meeting, 2008. Peine, 2008, Security goal indicator trees: a model of software features that supports efficient security inspection, 9 Pieters, 2015, Calculating adversarial risk from attack trees: control strength and probabilistic attackers, 201 Pinchinat, 2014, Towards synthesis of attack trees for supporting computer-aided risk analysis, 363 Ray, 2005, Using attack trees to identify malicious attacks from authorized insiders, 231 Reddy, 2008, Towards privacy taxonomy-based attack tree analysis for the protection of consumer information privacy, 56 Ten, 2007, Vulnerability assessment of cybersecurity for scada systems using attack trees, 1 M. Tentilucci, N. Roberts, S. Kandari, D. Johnson, D. Bogaard, B. Stackpole, G. Markowsky, Crowdsourcing computer security attack trees, in: 10th Annual Symposium on Information Assurance, ASIA’15, 2015, p. 19. Fall, 2014, Towards a vulnerability tree security evaluation of openstack’s logical architecture, 127 Franke, 2008 . IEC, Code for designation of colours. Cervesato, 2007, One picture is worth a dozen connectives: a fault-tree representation of npatrl security requirements, IEEE Trans. Dependable Secure Comput., 4, 216, 10.1109/TDSC.2007.70206 Marback, 2009, Security test generation using threat trees, 62 Fung, 2005, Survivability analysis of distributed systems using attack tree methodology, 583 Saini, 2008, Threat modeling using attack trees, J. Comput. Sci. Coll., 23, 124 Vidalis, 2003 Ongsakorn, 2010, Cyber threat trees for large system threat cataloging and analysis, 610 Wang, 2007, Toward measuring network security using attack graphs, 49 Wang, 2008 Keramati, 2012, An attack graph based metric for security evaluation of computer networks, 1094 Nichols, 2017, Introducing priority into hybrid attack graphs, 12 Williams, 2008, An interactive attack graph cascade and reachability display, 221 Zhang, 2017, Power system reliability assessment incorporating cyber attacks against wind farm energy management systems, IEEE Trans. Smart Grid, 8, 2343, 10.1109/TSG.2016.2523515 Zhang, 2017, A protocol vulnerability analysis method based on logical attack graph, 309 Wynekoop, 1997, Studying system development methodologies: an examination of research methods, Inf. Syst. J., 7, 47, 10.1046/j.1365-2575.1997.00004.x D.L. Moody, The method evaluation model: a theoretical model for validating information systems design methods, in: Proceedings of the 2013 European Conference on Information Systems, ECIS2013, 2003, p. 79.