Combining defense graphs and enterprise architecture models for security analysis
2008 (English)In: Proceedings - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008, 2008, 349-355 p.Conference paper (Refereed)
Security is dependent on a mixture of interrelated concepts such as technical countermeasures, organizational policies, security procedures, and more. To facilitate rational decision making, these concepts need to be combined into an overall judgment on the current security posture, as well as potential future ones. Decision makers are, however, faced with uncertainty regarding both what countermeasures that is in place, and how well different countermeasures contribute to mitigating attacks. This paper presents a security assessment framework using the Bayesian statistics-based Extended Influence Diagrams to combine attack graphs with countermeasures into defense graphs. The approach makes it possible to calculate the probability that attacks succeed based on an enterprise architecture model. The framework also takes uncertainties of the security assessment into consideration. Moreover, using the extended influence diagram formalism the expected loss from each attack can be calculated.
Place, publisher, year, edition, pages
2008. 349-355 p.
, IEEE International Enterprise Distributed Object Computing (EDOC) Conference, ISSN 1541-7719
Computer and Information Science Production Engineering, Human Work Science and Ergonomics
IdentifiersURN: urn:nbn:se:kth:diva-36468DOI: 10.1109/EDOC.2008.37ISI: 000260405700036ScopusID: 2-s2.0-56649088314ISBN: 978-0-7695-3373-5OAI: oai:DiVA.org:kth-36468DiVA: diva2:430879
12th IEEE International Enterprise Distributed Object Computing Munich, GERMANY, SEP 15-19, 2008
QC 2015507132011-07-132011-07-122015-07-13Bibliographically approved