A review of threat modelling approaches for APT-style attacks
Threats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2021-01-01
|
Series: | Heliyon |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2405844021000748 |
_version_ | 1818575755572936704 |
---|---|
author | Matt Tatam Bharanidharan Shanmugam Sami Azam Krishnan Kannoorpatti |
author_facet | Matt Tatam Bharanidharan Shanmugam Sami Azam Krishnan Kannoorpatti |
author_sort | Matt Tatam |
collection | DOAJ |
description | Threats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario. This can be done with Threat Modelling (TM), which assists with identifying, understanding and providing visibility of threats affecting an organisation. The focus of this study is to determine TM limitations, strengths, and any perceivable gaps. It has also focused on identifying any possible enhancements that may improve TM performance and efficiency when modelling sophisticated attacks such as Advanced Persistent Threats (APT). |
first_indexed | 2024-12-15T00:45:19Z |
format | Article |
id | doaj.art-f70680f355474a2fb142f6333bc4d428 |
institution | Directory Open Access Journal |
issn | 2405-8440 |
language | English |
last_indexed | 2024-12-15T00:45:19Z |
publishDate | 2021-01-01 |
publisher | Elsevier |
record_format | Article |
series | Heliyon |
spelling | doaj.art-f70680f355474a2fb142f6333bc4d4282022-12-21T22:41:33ZengElsevierHeliyon2405-84402021-01-0171e05969A review of threat modelling approaches for APT-style attacksMatt Tatam0Bharanidharan Shanmugam1Sami Azam2Krishnan Kannoorpatti3College of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaCorresponding author.; College of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaCollege of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaCollege of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaThreats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario. This can be done with Threat Modelling (TM), which assists with identifying, understanding and providing visibility of threats affecting an organisation. The focus of this study is to determine TM limitations, strengths, and any perceivable gaps. It has also focused on identifying any possible enhancements that may improve TM performance and efficiency when modelling sophisticated attacks such as Advanced Persistent Threats (APT).http://www.sciencedirect.com/science/article/pii/S2405844021000748Advanced persistent threatsThreat modellingCyber threat modelIntelligence |
spellingShingle | Matt Tatam Bharanidharan Shanmugam Sami Azam Krishnan Kannoorpatti A review of threat modelling approaches for APT-style attacks Heliyon Advanced persistent threats Threat modelling Cyber threat model Intelligence |
title | A review of threat modelling approaches for APT-style attacks |
title_full | A review of threat modelling approaches for APT-style attacks |
title_fullStr | A review of threat modelling approaches for APT-style attacks |
title_full_unstemmed | A review of threat modelling approaches for APT-style attacks |
title_short | A review of threat modelling approaches for APT-style attacks |
title_sort | review of threat modelling approaches for apt style attacks |
topic | Advanced persistent threats Threat modelling Cyber threat model Intelligence |
url | http://www.sciencedirect.com/science/article/pii/S2405844021000748 |
work_keys_str_mv | AT matttatam areviewofthreatmodellingapproachesforaptstyleattacks AT bharanidharanshanmugam areviewofthreatmodellingapproachesforaptstyleattacks AT samiazam areviewofthreatmodellingapproachesforaptstyleattacks AT krishnankannoorpatti areviewofthreatmodellingapproachesforaptstyleattacks AT matttatam reviewofthreatmodellingapproachesforaptstyleattacks AT bharanidharanshanmugam reviewofthreatmodellingapproachesforaptstyleattacks AT samiazam reviewofthreatmodellingapproachesforaptstyleattacks AT krishnankannoorpatti reviewofthreatmodellingapproachesforaptstyleattacks |