Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
514 Downloads (Pure)

Abstract

In this paper we identify requirements for choosing a threat modelling formalisation for modelling sophisticated malware such as Duqu 2.0. We discuss the gaps in current formalisations and propose the use of Attack Trees with Sequential Conjunction when it comes to analysing complex attacks. The paper models Duqu 2.0 based on the latest information sourced from formal and informal sources. This paper provides a well structured model which can be used for future analysis of Duqu 2.0 and related attacks.
Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Systems Security and Privacy
PublisherSciTePress
Pages465-472
Number of pages8
ISBN (Electronic)978-989-758-167-0
DOIs
Publication statusPublished - 21 Feb 2016
Event2nd International Conference on Information Systems Security and Privacy - Barceló Aran Mantegna Hotel, Rome, Italy
Duration: 19 Jan 201621 Feb 2016

Conference

Conference2nd International Conference on Information Systems Security and Privacy
CountryItaly
CityRome
Period19/01/201621/02/2016

Fingerprint Dive into the research topics of 'Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction'. Together they form a unique fingerprint.

  • Cite this

    Maynard, P., McLaughlin, K., & Sezer, S. (2016). Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (pp. 465-472). SciTePress. https://doi.org/10.5220/0005745704650472