Analyzing the Security in the GSM Radio Network Using Attack Jungles View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2010

AUTHORS

Parosh Aziz Abdulla , Jonathan Cederberg , Lisa Kaati

ABSTRACT

In this paper we introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack jungles. The tool was used to analyze the security of the GSM (radio) access network. More... »

PAGES

60-74

References to SciGraph publications

  • 2004. Tools for Generating and Analyzing Attack Graphs in FORMAL METHODS FOR COMPONENTS AND OBJECTS
  • 2006. Foundations of Attack Trees in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005
  • 2007. Strategic Games on Defense Trees in FORMAL ASPECTS IN SECURITY AND TRUST
  • Book

    TITLE

    Leveraging Applications of Formal Methods, Verification, and Validation

    ISBN

    978-3-642-16557-3
    978-3-642-16558-0

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-16558-0_8

    DOI

    http://dx.doi.org/10.1007/978-3-642-16558-0_8

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1027541994


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Uppsala University", 
              "id": "https://www.grid.ac/institutes/grid.8993.b", 
              "name": [
                "University of Uppsala, Sweden"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Abdulla", 
            "givenName": "Parosh Aziz", 
            "id": "sg:person.016647072671.38", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016647072671.38"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Uppsala University", 
              "id": "https://www.grid.ac/institutes/grid.8993.b", 
              "name": [
                "University of Uppsala, Sweden"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Cederberg", 
            "givenName": "Jonathan", 
            "id": "sg:person.016602616403.59", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016602616403.59"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Swedish Defence Research Agency", 
              "id": "https://www.grid.ac/institutes/grid.417839.0", 
              "name": [
                "FOI Swedish Defence Research Agency, Sweden"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kaati", 
            "givenName": "Lisa", 
            "id": "sg:person.014167565077.93", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014167565077.93"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/11734727_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005314780", 
              "https://doi.org/10.1007/11734727_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11734727_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005314780", 
              "https://doi.org/10.1007/11734727_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.entcs.2007.12.021", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017866887"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75227-1_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023572281", 
              "https://doi.org/10.1007/978-3-540-75227-1_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-75227-1_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023572281", 
              "https://doi.org/10.1007/978-3-540-75227-1_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1006/inco.1999.2843", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025783974"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30101-1_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047778931", 
              "https://doi.org/10.1007/978-3-540-30101-1_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30101-1_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047778931", 
              "https://doi.org/10.1007/978-3-540-30101-1_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icse.2004.1317437", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094919744"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2010", 
        "datePublishedReg": "2010-01-01", 
        "description": "In this paper we introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack jungles. The tool was used to analyze the security of the GSM (radio) access network.", 
        "editor": [
          {
            "familyName": "Margaria", 
            "givenName": "Tiziana", 
            "type": "Person"
          }, 
          {
            "familyName": "Steffen", 
            "givenName": "Bernhard", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-16558-0_8", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-16557-3", 
            "978-3-642-16558-0"
          ], 
          "name": "Leveraging Applications of Formal Methods, Verification, and Validation", 
          "type": "Book"
        }, 
        "name": "Analyzing the Security in the GSM Radio Network Using Attack Jungles", 
        "pagination": "60-74", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1027541994"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-16558-0_8"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "8333e98074c4ec873609bc8e64c1161d232eb61be6383f39af9fc69af9462f7b"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-16558-0_8", 
          "https://app.dimensions.ai/details/publication/pub.1027541994"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T08:28", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000363_0000000363/records_70066_00000001.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-642-16558-0_8"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16558-0_8'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16558-0_8'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16558-0_8'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16558-0_8'


     

    This table displays all metadata directly associated to this object as RDF triples.

    108 TRIPLES      23 PREDICATES      33 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-16558-0_8 schema:about anzsrc-for:08
    2 anzsrc-for:0806
    3 schema:author N544bd20f26534d9bb3ef331f7ac4e288
    4 schema:citation sg:pub.10.1007/11734727_17
    5 sg:pub.10.1007/978-3-540-30101-1_17
    6 sg:pub.10.1007/978-3-540-75227-1_1
    7 https://doi.org/10.1006/inco.1999.2843
    8 https://doi.org/10.1016/j.entcs.2007.12.021
    9 https://doi.org/10.1109/icse.2004.1317437
    10 schema:datePublished 2010
    11 schema:datePublishedReg 2010-01-01
    12 schema:description In this paper we introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack jungles. The tool was used to analyze the security of the GSM (radio) access network.
    13 schema:editor N252f2d1d6fe1478e89576b6babfb53c8
    14 schema:genre chapter
    15 schema:inLanguage en
    16 schema:isAccessibleForFree true
    17 schema:isPartOf N0c5bc89e0e1a4c74b468e6742bb2e256
    18 schema:name Analyzing the Security in the GSM Radio Network Using Attack Jungles
    19 schema:pagination 60-74
    20 schema:productId N387395773d4a4b60b22c024f77d17431
    21 N9be8149bf12e4518a993eb4f4d044972
    22 Nbd91e55ec6a94da29aabea8f6320e82c
    23 schema:publisher N12eb839a4e064cb0a2721f2d44794680
    24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027541994
    25 https://doi.org/10.1007/978-3-642-16558-0_8
    26 schema:sdDatePublished 2019-04-16T08:28
    27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    28 schema:sdPublisher N920f64e053f9434a887ff6a06495eac4
    29 schema:url https://link.springer.com/10.1007%2F978-3-642-16558-0_8
    30 sgo:license sg:explorer/license/
    31 sgo:sdDataset chapters
    32 rdf:type schema:Chapter
    33 N04193eba24174db1b3deaa2ba1b2ad61 rdf:first N3bdfeeedede4473dad9f3b86ab046f29
    34 rdf:rest rdf:nil
    35 N0b6d08ffbe7d4d8ea014beb6dba4e187 rdf:first sg:person.016602616403.59
    36 rdf:rest N575f173762bf45d28605b2cee73bbf70
    37 N0c5bc89e0e1a4c74b468e6742bb2e256 schema:isbn 978-3-642-16557-3
    38 978-3-642-16558-0
    39 schema:name Leveraging Applications of Formal Methods, Verification, and Validation
    40 rdf:type schema:Book
    41 N12eb839a4e064cb0a2721f2d44794680 schema:location Berlin, Heidelberg
    42 schema:name Springer Berlin Heidelberg
    43 rdf:type schema:Organisation
    44 N1c978a745d8c47d1bc691920fdaefd2a schema:familyName Margaria
    45 schema:givenName Tiziana
    46 rdf:type schema:Person
    47 N252f2d1d6fe1478e89576b6babfb53c8 rdf:first N1c978a745d8c47d1bc691920fdaefd2a
    48 rdf:rest N04193eba24174db1b3deaa2ba1b2ad61
    49 N387395773d4a4b60b22c024f77d17431 schema:name doi
    50 schema:value 10.1007/978-3-642-16558-0_8
    51 rdf:type schema:PropertyValue
    52 N3bdfeeedede4473dad9f3b86ab046f29 schema:familyName Steffen
    53 schema:givenName Bernhard
    54 rdf:type schema:Person
    55 N544bd20f26534d9bb3ef331f7ac4e288 rdf:first sg:person.016647072671.38
    56 rdf:rest N0b6d08ffbe7d4d8ea014beb6dba4e187
    57 N575f173762bf45d28605b2cee73bbf70 rdf:first sg:person.014167565077.93
    58 rdf:rest rdf:nil
    59 N920f64e053f9434a887ff6a06495eac4 schema:name Springer Nature - SN SciGraph project
    60 rdf:type schema:Organization
    61 N9be8149bf12e4518a993eb4f4d044972 schema:name readcube_id
    62 schema:value 8333e98074c4ec873609bc8e64c1161d232eb61be6383f39af9fc69af9462f7b
    63 rdf:type schema:PropertyValue
    64 Nbd91e55ec6a94da29aabea8f6320e82c schema:name dimensions_id
    65 schema:value pub.1027541994
    66 rdf:type schema:PropertyValue
    67 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    68 schema:name Information and Computing Sciences
    69 rdf:type schema:DefinedTerm
    70 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    71 schema:name Information Systems
    72 rdf:type schema:DefinedTerm
    73 sg:person.014167565077.93 schema:affiliation https://www.grid.ac/institutes/grid.417839.0
    74 schema:familyName Kaati
    75 schema:givenName Lisa
    76 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014167565077.93
    77 rdf:type schema:Person
    78 sg:person.016602616403.59 schema:affiliation https://www.grid.ac/institutes/grid.8993.b
    79 schema:familyName Cederberg
    80 schema:givenName Jonathan
    81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016602616403.59
    82 rdf:type schema:Person
    83 sg:person.016647072671.38 schema:affiliation https://www.grid.ac/institutes/grid.8993.b
    84 schema:familyName Abdulla
    85 schema:givenName Parosh Aziz
    86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016647072671.38
    87 rdf:type schema:Person
    88 sg:pub.10.1007/11734727_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005314780
    89 https://doi.org/10.1007/11734727_17
    90 rdf:type schema:CreativeWork
    91 sg:pub.10.1007/978-3-540-30101-1_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047778931
    92 https://doi.org/10.1007/978-3-540-30101-1_17
    93 rdf:type schema:CreativeWork
    94 sg:pub.10.1007/978-3-540-75227-1_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023572281
    95 https://doi.org/10.1007/978-3-540-75227-1_1
    96 rdf:type schema:CreativeWork
    97 https://doi.org/10.1006/inco.1999.2843 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025783974
    98 rdf:type schema:CreativeWork
    99 https://doi.org/10.1016/j.entcs.2007.12.021 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017866887
    100 rdf:type schema:CreativeWork
    101 https://doi.org/10.1109/icse.2004.1317437 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094919744
    102 rdf:type schema:CreativeWork
    103 https://www.grid.ac/institutes/grid.417839.0 schema:alternateName Swedish Defence Research Agency
    104 schema:name FOI Swedish Defence Research Agency, Sweden
    105 rdf:type schema:Organization
    106 https://www.grid.ac/institutes/grid.8993.b schema:alternateName Uppsala University
    107 schema:name University of Uppsala, Sweden
    108 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...