Published November 20, 2024 | Version v1
Software Open

How hard can it be? Quantifying MITRE attack campaigns with attack trees and cATM logic (experimental reproduction package)

  • 1. ROR icon University of Twente
  • 2. Eindhoven University of Technology
  • 3. ROR icon Radboud University Nijmegen
  • 4. Vrije Universiteit Amsterdam
  • 5. ROR icon University of Trento

Description

This artifact permits to reproduce the experimental results obtained with the techniques and algorithms presented in the paper "How hard can it be? Quantifying MITRE attack campaigns with attack trees and cATM logic" by Nicoletti et al. (to appear).

The contents include the dataset and the algorithms used in the presented method, to perform quantitative comparisons of MITRE ATT&CK Enterprise Campaigns—see https://attack.mitre.org/campaigns/.

Files

README.md

Files (164.8 MB)

Name Size Download all
md5:b22de8814ba0cf5cfecf838f9abe96d5
163.2 MB Download
md5:53cc65ce4179d24db7784f20da6feb33
27.8 kB Download
md5:0426b498e5988fda25cab08327861e2c
14.9 kB Preview Download
md5:68dfa8ee46cc414fb2ca6c3f4d598403
1.5 MB Preview Download

Additional details

Funding

European Commission
ProSVED – Projection of Security Vulnerabilities caused by Exploits in Dependencies 101067199
European Commission
CAESAR – Integrating Safety and Cybersecurity through Stochastic Model Checking 864075
Ministero dell'università e della ricerca
Smartitude - PRIN 2022 - NextGenerationEU D53D23008400006
Ministero dell'università e della ricerca
SERICS - PNRR - NextGenerationEU PE00000014
Dutch Research Council
PrimaVera: Predictive maintenance for Very effective asset management 33696
European Research Council
RUBICON 101187945

Software

Programming language
Python, Shell