2 REFLECTING ON ATTACK 
AND RESPONSE MODELS 
Many attack models and classification schemes tend 
to describe cyber-attacks in one of two ways; either 
as hierarchical structures or as linear processes. 
Hierarchical structures (e.g., attack trees) have the 
advantage of describing attacks in terms of their 
different properties, but often neglect the temporal 
component e.g. AVOIDIT (Simmons et al., 1997), 
CAPEC (MITRE, 2015), VERIS (VERIS, 2015), 
NIST (NIST, 2015), SANS (SANS, 2015). Linear 
processes capture the temporal element since they 
assume that actions happen sequentially (Howard and 
Longstaff, 1998; Hutchins et al., 2011), however, 
may fail to describe lateral movement or cases where 
attacks occur in parallel. 
Many prior works attempt to outline attacks 
comprehensively or provide explanations of the direst 
consequences when an attack succeeds. In addition, 
they describe ideal solutions, see for instance several 
of MITRE’s efforts (2015), FIRST’s efforts (2015) 
and VERIS efforts (2015). While these efforts show 
substantial progress in tackling cyber-attacks, they 
may not be feasible for all circumstances, particularly 
when decisions have to be made with limited 
resources (regarding information available and time 
constraints, e.g. during an electric blackout), 
technical and operational common sense has to 
prevail when making decisions and incident 
responses quickly.  
To the best of our knowledge, no truly pragmatic 
approach to facilitate understanding of attacks and to 
provide a framework to ensure technical and 
operational sanity exists. It is worth noting here that 
we do not consider practical in terms of convenience, 
but in terms of necessity and efficiency (due to 
limited resources). No model uses easy-to-grasp 
reasoning to aid understanding and response to cyber-
attacks that is able to abstract the technical details of 
an attack and simply consider its properties. Other 
models that we have considered but are not included 
above due to space limitations include (Bishop, 
1995); Lough, 2001); (Ten et al., 2010), but were still 
considered in our model. 
2.1 Commonalities Across Models 
From the models we have reviewed, we were able to 
identify a number of noteworthy differences and 
common factors. For instance, at the core of each of 
the attack models, they detail the specific activities 
leading to the compromise of some security feature 
(whether it be confidentiality, integrity or 
availability) of an asset. While some (e.g., the 
Killchain) place more emphasis on the types of attack 
steps and characterising what goal each step is 
seeking to reach, others (such as VERIS (2015)) 
adopt more general steps and focus on the wider 
problem. In terms of attack modelling, possibly the 
most representative model is that of Howard's 
taxonomy to specify incidents. It captures several of 
the actions within an incident but also sheds light on 
the reason for an attack (e.g., for financial gain, to 
cause system damage, or for political gain). 
While attack models allow for a detailed analysis 
of an attack, incident response models consider what 
attack has been launched, but especially how to 
appropriately respond to it. In the NIST model above 
(NIST, 2015) for instance, we see a requirement to 
detect an attack, but a majority of the life cycle is on 
responding to it. Some of the key questions in 
incident response target why and how an attack 
occurred, and who caused it. Almost identical 
questions can be found in the SANS model and 
process flow for incidents.  
Across the more attack-focused models and those 
more geared to incident response, there are notable 
commonalities. To start, there is an aim to understand 
incidents and clearly define what has been impacted 
and the activities that have led to a breach of an 
asset’s security. Key questions on motivation may 
also inform the choices of actions after attacks. 
Our approach shares commonalities with business 
continuity/cyber resilience models (for an overview, 
see (Gibson and Tarrant, 2010) and (Caralli et al., 
2010), with the key distinction being that our efforts 
are mainly attack focused and intended to be used by 
Security Operations Centres (SOCs) and Computer 
Emergency Response Teams (CERTs). 
3 A PRAGMATIC 
SYSTEM-FAILURE 
ASSESSMENT AND RESPONSE 
MODEL (SAM) 
Our System-failure Assessment and response Model 
(SAM) is a directed human-reasoning approach to 
incident handling that uses abstraction as part of the 
reasoning process. The decision-making process that 
the model promotes is based on deduction and 
experience. 
A series of high-level observables from very basic 
questions are able to provide first-pass indicators of 
how to respond. For instance, in the case of 
attempting to identify impact of an attack, and