A review of threat modelling approaches for APT-style attacks

Threats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or...

Full description

Bibliographic Details
Main Authors: Matt Tatam, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti
Format: Article
Language:English
Published: Elsevier 2021-01-01
Series:Heliyon
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2405844021000748
_version_ 1818575755572936704
author Matt Tatam
Bharanidharan Shanmugam
Sami Azam
Krishnan Kannoorpatti
author_facet Matt Tatam
Bharanidharan Shanmugam
Sami Azam
Krishnan Kannoorpatti
author_sort Matt Tatam
collection DOAJ
description Threats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario. This can be done with Threat Modelling (TM), which assists with identifying, understanding and providing visibility of threats affecting an organisation. The focus of this study is to determine TM limitations, strengths, and any perceivable gaps. It has also focused on identifying any possible enhancements that may improve TM performance and efficiency when modelling sophisticated attacks such as Advanced Persistent Threats (APT).
first_indexed 2024-12-15T00:45:19Z
format Article
id doaj.art-f70680f355474a2fb142f6333bc4d428
institution Directory Open Access Journal
issn 2405-8440
language English
last_indexed 2024-12-15T00:45:19Z
publishDate 2021-01-01
publisher Elsevier
record_format Article
series Heliyon
spelling doaj.art-f70680f355474a2fb142f6333bc4d4282022-12-21T22:41:33ZengElsevierHeliyon2405-84402021-01-0171e05969A review of threat modelling approaches for APT-style attacksMatt Tatam0Bharanidharan Shanmugam1Sami Azam2Krishnan Kannoorpatti3College of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaCorresponding author.; College of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaCollege of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaCollege of Engineering, IT and Environment, Charles Darwin University, NT, 0810, AustraliaThreats are potential events, intentional or not, that compromise the confidentiality, integrity, and/or availability of information systems. Defending against threats and attacks requires actionable threat intelligence. Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario. This can be done with Threat Modelling (TM), which assists with identifying, understanding and providing visibility of threats affecting an organisation. The focus of this study is to determine TM limitations, strengths, and any perceivable gaps. It has also focused on identifying any possible enhancements that may improve TM performance and efficiency when modelling sophisticated attacks such as Advanced Persistent Threats (APT).http://www.sciencedirect.com/science/article/pii/S2405844021000748Advanced persistent threatsThreat modellingCyber threat modelIntelligence
spellingShingle Matt Tatam
Bharanidharan Shanmugam
Sami Azam
Krishnan Kannoorpatti
A review of threat modelling approaches for APT-style attacks
Heliyon
Advanced persistent threats
Threat modelling
Cyber threat model
Intelligence
title A review of threat modelling approaches for APT-style attacks
title_full A review of threat modelling approaches for APT-style attacks
title_fullStr A review of threat modelling approaches for APT-style attacks
title_full_unstemmed A review of threat modelling approaches for APT-style attacks
title_short A review of threat modelling approaches for APT-style attacks
title_sort review of threat modelling approaches for apt style attacks
topic Advanced persistent threats
Threat modelling
Cyber threat model
Intelligence
url http://www.sciencedirect.com/science/article/pii/S2405844021000748
work_keys_str_mv AT matttatam areviewofthreatmodellingapproachesforaptstyleattacks
AT bharanidharanshanmugam areviewofthreatmodellingapproachesforaptstyleattacks
AT samiazam areviewofthreatmodellingapproachesforaptstyleattacks
AT krishnankannoorpatti areviewofthreatmodellingapproachesforaptstyleattacks
AT matttatam reviewofthreatmodellingapproachesforaptstyleattacks
AT bharanidharanshanmugam reviewofthreatmodellingapproachesforaptstyleattacks
AT samiazam reviewofthreatmodellingapproachesforaptstyleattacks
AT krishnankannoorpatti reviewofthreatmodellingapproachesforaptstyleattacks