A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
An attack surface metric
Measurement of software security is a long-standing challenge to the research community.
At the same time, practical security metrics and measurements are essential for secure …
At the same time, practical security metrics and measurements are essential for secure …
Experimenting with quantitative evaluation tools for monitoring operational security
This paper presents the results of an experiment in security evaluation. The system is
modeled as a privilege graph that exhibits its security vulnerabilities. Quantitative measures …
modeled as a privilege graph that exhibits its security vulnerabilities. Quantitative measures …
A review of information security issues and respective research contributions
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …
communication, security management, development of secure Information Systems), and …
Model-based security metrics using adversary view security evaluation (advise)
System architects need quantitative security metrics to make informed trade-off decisions
involving system security. The security metrics need to provide insight on weak points in the …
involving system security. The security metrics need to provide insight on weak points in the …
Cyber attack exposure evaluation framework for the smart grid
The smart grid's heavy reliance on cyber resources introduces numerous security concerns.
The substantial attack surface presented by the advanced metering infrastructure (AMI) …
The substantial attack surface presented by the advanced metering infrastructure (AMI) …
Towards a theory of insider threat assessment
R Chinchani, A Iyer, HQ Ngo… - … Systems and Networks …, 2005 - ieeexplore.ieee.org
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The
threat is attributed to legitimate users who abuse their privileges, and given their familiarity …
threat is attributed to legitimate users who abuse their privileges, and given their familiarity …
A survey on the usability and practical applications of graphical security models
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
[HTML][HTML] An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
Abstract Self-Sovereign Identity (SSI) empowers users to govern their digital identity and
personal data. This approach has changed the identity paradigm where users become the …
personal data. This approach has changed the identity paradigm where users become the …