2 REFLECTING ON ATTACK
AND RESPONSE MODELS
Many attack models and classification schemes tend
to describe cyber-attacks in one of two ways; either
as hierarchical structures or as linear processes.
Hierarchical structures (e.g., attack trees) have the
advantage of describing attacks in terms of their
different properties, but often neglect the temporal
component e.g. AVOIDIT (Simmons et al., 1997),
CAPEC (MITRE, 2015), VERIS (VERIS, 2015),
NIST (NIST, 2015), SANS (SANS, 2015). Linear
processes capture the temporal element since they
assume that actions happen sequentially (Howard and
Longstaff, 1998; Hutchins et al., 2011), however,
may fail to describe lateral movement or cases where
attacks occur in parallel.
Many prior works attempt to outline attacks
comprehensively or provide explanations of the direst
consequences when an attack succeeds. In addition,
they describe ideal solutions, see for instance several
of MITRE’s efforts (2015), FIRST’s efforts (2015)
and VERIS efforts (2015). While these efforts show
substantial progress in tackling cyber-attacks, they
may not be feasible for all circumstances, particularly
when decisions have to be made with limited
resources (regarding information available and time
constraints, e.g. during an electric blackout),
technical and operational common sense has to
prevail when making decisions and incident
responses quickly.
To the best of our knowledge, no truly pragmatic
approach to facilitate understanding of attacks and to
provide a framework to ensure technical and
operational sanity exists. It is worth noting here that
we do not consider practical in terms of convenience,
but in terms of necessity and efficiency (due to
limited resources). No model uses easy-to-grasp
reasoning to aid understanding and response to cyber-
attacks that is able to abstract the technical details of
an attack and simply consider its properties. Other
models that we have considered but are not included
above due to space limitations include (Bishop,
1995); Lough, 2001); (Ten et al., 2010), but were still
considered in our model.
2.1 Commonalities Across Models
From the models we have reviewed, we were able to
identify a number of noteworthy differences and
common factors. For instance, at the core of each of
the attack models, they detail the specific activities
leading to the compromise of some security feature
(whether it be confidentiality, integrity or
availability) of an asset. While some (e.g., the
Killchain) place more emphasis on the types of attack
steps and characterising what goal each step is
seeking to reach, others (such as VERIS (2015))
adopt more general steps and focus on the wider
problem. In terms of attack modelling, possibly the
most representative model is that of Howard's
taxonomy to specify incidents. It captures several of
the actions within an incident but also sheds light on
the reason for an attack (e.g., for financial gain, to
cause system damage, or for political gain).
While attack models allow for a detailed analysis
of an attack, incident response models consider what
attack has been launched, but especially how to
appropriately respond to it. In the NIST model above
(NIST, 2015) for instance, we see a requirement to
detect an attack, but a majority of the life cycle is on
responding to it. Some of the key questions in
incident response target why and how an attack
occurred, and who caused it. Almost identical
questions can be found in the SANS model and
process flow for incidents.
Across the more attack-focused models and those
more geared to incident response, there are notable
commonalities. To start, there is an aim to understand
incidents and clearly define what has been impacted
and the activities that have led to a breach of an
asset’s security. Key questions on motivation may
also inform the choices of actions after attacks.
Our approach shares commonalities with business
continuity/cyber resilience models (for an overview,
see (Gibson and Tarrant, 2010) and (Caralli et al.,
2010), with the key distinction being that our efforts
are mainly attack focused and intended to be used by
Security Operations Centres (SOCs) and Computer
Emergency Response Teams (CERTs).
3 A PRAGMATIC
SYSTEM-FAILURE
ASSESSMENT AND RESPONSE
MODEL (SAM)
Our System-failure Assessment and response Model
(SAM) is a directed human-reasoning approach to
incident handling that uses abstraction as part of the
reasoning process. The decision-making process that
the model promotes is based on deduction and
experience.
A series of high-level observables from very basic
questions are able to provide first-pass indicators of
how to respond. For instance, in the case of
attempting to identify impact of an attack, and