kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Containment Strategy Formalism in a Probabilistic Threat Modelling Framework
KTH, School of Electrical Engineering and Computer Science (EECS).ORCID iD: 0000-0002-1639-2673
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0003-3922-9606
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0003-2549-6578
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-4641-9240
2022 (English)In: Proceedings of the 8th international conference on information systems security and privacy (ICISSP) / [ed] Paolo Mori, Gabriele Lenzini, Steven Furnell, Scitepress , 2022, Vol. 1, p. 108-120Conference paper, Published paper (Refereed)
Abstract [en]

Foreseeing, mitigating and preventing cyber-attacks is more important than ever before. Advances in the field of probabilistic threat modelling can help organisations understand their own resilience profile against cyber-attacks. Previous research has proposed MAL, a meta language for capturing the attack logic of a considered domain and running attack simulations in a model that depicts the defended IT-infrastructure. While this modality is already somewhat established for proposing general threat mitigation actions, less is known about how to model containment strategies in the event that penetration already has occurred. The problem is a fundamental gap between predominant threat models in cyber-security research and containment in the incident response lifecycle. This paper presents a solution to the problem by summarizing a methodology for reasoning about containment strategies in MAL-based threat models.

Place, publisher, year, edition, pages
Scitepress , 2022. Vol. 1, p. 108-120
Series
Proceedings of the 8th International Conference on Information Systems Security and Privacy 2022, ISSN 2184-4356
Keywords [en]
Threat Analysis, MAL, Containment strategies, Simulated Annealing
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-310910DOI: 10.5220/0010823800003120ISI: 000818770500009Scopus ID: 2-s2.0-85176317924OAI: oai:DiVA.org:kth-310910DiVA, id: diva2:1651148
Conference
8th International Conference on Information Systems Security and Privacy (ICISSP), Virtual/Online, 9-11 February, 2022
Projects
SOCCRATES
Funder
Security Link, 833481
Note

Part of proceedings: ISBN 978-989-758-553-1

QC 20220419

QC 20220708

Available from: 2022-04-11 Created: 2022-04-11 Last updated: 2023-11-23Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopusConference

Authority records

Fahlander, PerEkstedt, MathiasMukherjee, PreetamDwivedi, Ashish Kumar

Search in DiVA

By author/editor
Fahlander, PerEkstedt, MathiasMukherjee, PreetamDwivedi, Ashish Kumar
By organisation
School of Electrical Engineering and Computer Science (EECS)Network and Systems Engineering
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 127 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf