Abstract
In this paper we identify requirements for choosing a threat modelling formalisation for modelling sophisticated malware such as Duqu 2.0. We discuss the gaps in current formalisations and propose the use of Attack Trees with Sequential Conjunction when it comes to analysing complex attacks. The paper models Duqu 2.0 based on the latest information sourced from formal and informal sources. This paper provides a well structured model which can be used for future analysis of Duqu 2.0 and related attacks.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 2nd International Conference on Information Systems Security and Privacy |
| Publisher | SciTePress |
| Pages | 465-472 |
| Number of pages | 8 |
| ISBN (Electronic) | 978-989-758-167-0 |
| DOIs | |
| Publication status | Published - 21 Feb 2016 |
| Event | 2nd International Conference on Information Systems Security and Privacy - Barceló Aran Mantegna Hotel, Rome, Italy Duration: 19 Jan 2016 → 21 Feb 2016 |
Conference
| Conference | 2nd International Conference on Information Systems Security and Privacy |
|---|---|
| Country/Territory | Italy |
| City | Rome |
| Period | 19/01/2016 → 21/02/2016 |
Fingerprint
Dive into the research topics of 'Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction'. Together they form a unique fingerprint.Projects
- 1 Finished
-
R1594ECI: Analysing and Detecting Advanced Multistage Attacks Against ICS
McLaughlin, K. (PI)
13/01/2016 → 30/09/2018
Project: Research
-
SCADA Intrusion Detection System
McLaughlin, K. (Speaker)
08 Sept 2015Activity: Talk or presentation types › Invited talk
File -
SPARKS Smart Grid Cybersecurity Stakeholder Workshop
McLaughlin, K. (Keynote/plenary speaker)
Mar 2015Activity: Participating in or organising an event types › Participation in workshop, seminar, course
-
Secure Communications in Smart Grid: Networking and Protocols
McLaughlin, K., Friedberg, I., Kang, B., Maynard, P., Sezer, S. & McWilliams, G., Jul 2015, Smart Grid Security: Innovative Solutions for a Modernized Grid. Elsevier, p. 113-148Research output: Chapter in Book/Report/Conference proceeding › Chapter
18 Link opens in a new tab Citations (Scopus) -
Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks
Maynard, P., McLaughlin, K. & Haberler, B., 12 Sept 2014.Research output: Contribution to conference › Paper › peer-review
Open Access
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver