| Literature DB >> 33506133 |
Matt Tatam1, Bharanidharan Shanmugam1, Sami Azam1, Krishnan Kannoorpatti1.
Abstract
Threats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario. This can be done with Threat Modelling (TM), which assists with identifying, understanding and providing visibility of threats affecting an organisation. The focus of this study is to determine TM limitations, strengths, and any perceivable gaps. It has also focused on identifying any possible enhancements that may improve TM performance and efficiency when modelling sophisticated attacks such as Advanced Persistent Threats (APT).Entities:
Keywords: Advanced persistent threats; Cyber threat model; Intelligence; Threat modelling
Year: 2021 PMID: 33506133 PMCID: PMC7814160 DOI: 10.1016/j.heliyon.2021.e05969
Source DB: PubMed Journal: Heliyon ISSN: 2405-8440
Figure 1The pyramid of pain [10].
Figure 2Threat modelling approaches.
Research papers identified.
| Source | CDU Library | IEEE-Explore | Science Direct | Misc. | Total |
|---|---|---|---|---|---|
| Results | 70 | 22 | 14 | ||
| Filtered | 9 | 0 | 0 | ||
| Duplicates | 9 | 10 | 9 | ||
| Primary | 44 | 13 | 12 | 4 | 49 |
| Secondary | 17 | 9 | 2 | 13 | 40 |
| Additional | 12 | 12 | |||
Research search criteria.
| Search String | “Threat Model” “Threat Modelling” “Threat Intelligence” “APT” Cyber |
| Inclusion filter | Journals, Early Access Articles, Articles |
| Exclusion filter | Sharing |
Threat Modelling studies.
| DFD | STRIDE | Attack Trees | Stochastic | Kill Chain | PRE-ATT&CK | ATT&CK | CAPEC | TARA | Diamond | NIST 800-154 |
|---|---|---|---|---|---|---|---|---|---|---|
| [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ |
Figure 3Cyber Threat Intelligence approaches [15].
Figure 4Reviewed papers data and system-centric.
Figure 5Reviewed papers asset and threat-centric.
Figure 6Reviewed papers Formal/Graphical TM.
Figure 7Reviewed papers automated or manual TM.
Figure 8Quadrants identifying Automated/Manual and Formal/Graphical Threat Models.
Threat Model strengths.
| Advantages (✓) | DFD | STRIDE | Attack Trees | Stochastic | Kill Chain | PRE-ATT&CK | ATT&CK | CAPEC | TARA | Diamond | NIST 800-154 |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Accessible in MISP | |||||||||||
| Adversary Capability [ | |||||||||||
| Available from Threat feeds [ | |||||||||||
| Usage with STIX [ | |||||||||||
| Can automate TM process | |||||||||||
| Can be combined with other threat models | |||||||||||
| Maps exploits against vulnerable systems & environment to attack vectors | |||||||||||
| Identifies data at risk – storage, processing & in-transit [ | |||||||||||
| Easy to use [ | |||||||||||
| Extensible/Flexible [ | |||||||||||
| Good documentation [ | |||||||||||
| High Maturity [ | |||||||||||
| Identifies gaps [ | |||||||||||
| Identifies phases/elements/patterns in Attacks (composite threats) [ | |||||||||||
| Link individual intrusions to campaign (APT) | |||||||||||
| Map defensive controls or countermeasures | |||||||||||
| Prioritises Threats [ | |||||||||||
| Software design, analysis, testing and support [ | |||||||||||
| Standards based or well structured | |||||||||||
| Taxonomy for Pre & Post compromises | |||||||||||
| Models the time-agnostic nature of TTP (APT) | |||||||||||
| Used for Attack simulations or Penetration testing | |||||||||||
| Used for Investigations | |||||||||||
| Used for Threat Hunting/Detections | |||||||||||
| Uses one or many threat catalogues | |||||||||||
| Validate/assesses capability of defensive controls |
Threat model limitations.
| Limitations ( | DFD | STRIDE | Attack Trees | Stochastic | Kill Chain | PRE-ATT&CK | ATT&CK | CAPEC | TARA | Diamond | NIST 800-154 |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Challenging map attacks (TTP's) to environment (data, configurations, vulnerabilities) [ | |||||||||||
| Challenging to determine malicious vs non-malicious techniques [ | |||||||||||
| Challenging to map attacks to defences against an attack (Controls) [ | |||||||||||
| Challenging to map/detect all the many permutations of event, actions and execution | |||||||||||
| Has trouble scaling to large environments | |||||||||||
| High rate of false negatives [ | |||||||||||
| Identifies high level details not specific attack details | |||||||||||
| Labor intensive or time consuming to develop and maintain [ | |||||||||||
| Limited in modelling insider threats | |||||||||||
| Limited scoring analysis [ | |||||||||||
| Limited to software/application threat modelling | |||||||||||
| Manual | |||||||||||
| Not all phases are used in a compromise | |||||||||||
| Not an exhaustive enumeration of attack vectors against software | |||||||||||
| Not effective at how sequences of actions relate to adversary objectives | |||||||||||
| Not Extensible/Not Flexible? | |||||||||||
| Requires constant updating/Maintenance | |||||||||||
| Requires expertise and environmental (contextual/vulnerability chaining) knowledge | |||||||||||
| Requires high level of maturity of processes [ |
Assigning strengths to Threat models.
| Strength | Iteration 1 | Iteration 2 | Iteration 3 | ||||||
|---|---|---|---|---|---|---|---|---|---|
| 1 Reviewer (A) | 3 Reviewers (A, B, C) | 3 Reviewers (A, B, C) | |||||||
| Threat Models | A | B | C | A | B | C | A | B | C |
| DFD | |||||||||
| STRIDE | |||||||||
| Attack Trees | |||||||||
| Stochastic | |||||||||
| Kill chain | |||||||||
| PRE-ATT&CK | |||||||||
| ATT&CK | |||||||||
| CAPEC | |||||||||
| TARA | |||||||||
| Diamond | |||||||||
| NIST 800-154 | |||||||||
Assigning limitations to Threat models.
| Limitation | Iteration 1 | Iteration 2 | Iteration 3 | ||||||
|---|---|---|---|---|---|---|---|---|---|
| 2 Reviewers (A, B, C) | 3 Reviewers (A, B, C) | 3 Reviewers (A, B, C) | |||||||
| Threat Models | A | B | C | A | B | C | A | B | C |
| DFD | |||||||||
| STRIDE | |||||||||
| Attack Trees | |||||||||
| Stochastic | |||||||||
| Kill chain | |||||||||
| PRE-ATT&CK | |||||||||
| ATT&CK | |||||||||
| CAPEC | |||||||||
| TARA | |||||||||
| Diamond | |||||||||
| NIST 800-154 | |||||||||
Post iteration Code Agreement matrix.
| Iteration 1 | Iteration 2 | Iteration 3 | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Reviewers (A, B) | Reviewers (A, B, C) | Reviewers (A, B, C) | |||||||
| Code | A | B | C | A | B | C | A | B | C |
| Strength | 35 | 0 | - | 21 | 21 | 21 | 26 | 26 | 26 |
| Limitation | 27 | 22 | - | 19 | 19 | 19 | 19 | 19 | 19 |
| Agreement | 1.0 | 0.8 | - | 1.0 | 1.0 | 1.0 | 1.0 | 1.0 | 1.0 |
Threat types for the four elements of a DFD.
| DFD Element Type | S | T | R | I | D | E |
|---|---|---|---|---|---|---|
| External Entity | ||||||
| Data Flow | ||||||
| Data Store | ||||||
| Process |
Figure 9ATT&CK Model relationships [63].
Figure 10The diamond model [77, 78]
Machine learning applied to ATT&CK Techniques.
| ATT&CK Technique | Use Case | Evaluated Algorithms | Most Effective Algorithm |
|---|---|---|---|
| Initial Access | Message Classification | Random Forest Classifier | Random Forest Classifier |
| Executions | Anomalous Process Executions | One-Class SVM (OCSVM) Classifier Gaussian Kernel Linear Kernel Polynomial Kernel Radial Kernel | OCSVM Classifier |
| Discovery | Predicting User's Processes | Linear Regression Decision Tree Regression Random Forest Regression | Linear Regression |
| Ex-Filtration | Data Rate Analytic | K-Means Clustering Density-Based Spatial Clustering (DBSCAN) Balanced Iterative Reducing and Clustering using Hierarchical (BIRCH) | K-Means Clustering |
| Exploitation | Parent Child Process' Analytic | Logistic Regression Decision Trees Naive Bayes Decision Tree classifiers | Logistic Regression |