kth.sePublications
Change search
Refine search result
123 1 - 50 of 150
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Andrén, Samuel
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lindström, Erik
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Hugosson, Alice
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Rönnqvist, Sofia
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Hacks, Simon
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Assessing Alignment Between Business and IT Strategy: A Case Study2020In: Proceedings of the Forum at Practice of Enterprise Modeling 2020 co-located with the 13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), CEUR-WS , 2020, Vol. 2793, p. 1-12Conference paper (Refereed)
    Abstract [en]

    Strategic alignment between business and IT is a topic of high importance to modern businesses, but it remainsproblematic to implement structured methods to improve and assess alignment in many organisations. Thisstudy investigates how organisations can better leverage published strategic alignment theory and methods,finding that previous research has not sufficiently considered the different dimensions of strategy and thatsuch considerations would help enterprises improve strategic alignment. The study proposes a framework forunderstanding strategic alignment in hierarchical business-led organisations, exemplified in a case study ofTrafikförvaltningen, the Stockholm public transport authority.

  • 2. Bjuhr, O.
    et al.
    Segeljakt, K.
    Addibpour, M.
    Heiser, F.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Software architecture decoupling at ericsson2017In: Proceedings - 2017 IEEE International Conference on Software Architecture Workshops, ICSAW 2017: Side Track Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 259-262, article id 7958500Conference paper (Refereed)
    Abstract [en]

    In order to evaluate and increase modularity this paper combines a method for visualizing and measuring software architectures and two algorithms for decoupling. The combination is tested on a software system at Ericsson. Our analysis show that the system has one large cluster of components (18% of the system, a Core), all interacting with each other. By employing cluster and dominator analysis we suggest 19 dependencies to be removed in order to decouple the Core. Validating the analysis output with experts at Ericsson six of the suggested dependencies where deemed impossible to remove. By removing the remaining 13 dependencies Ericsson would improve the architecture of their system considerably, e.g. core size would go down to 5%.

  • 3. Blom, Rikard
    et al.
    Korman, Matus
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Robert, Lagerström
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Mathias, Ekstedt
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Analyzing attack resilience of an advanced meter infrastructure reference model2016In: Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), IEEE conference proceedings, 2016Conference paper (Refereed)
    Abstract [en]

    Advanced metering infrastructure (AMI) is a key component of the concept of smart power grids. Although several functional/logical reference models of AMI exist, they are not suited for automated analysis of properties such as cyber security. This paper briefly presents a reference model of AMI that follows a tested and even commercially adopted formalism allowing automated analysis of cyber security. Finally, this paper presents an example cyber security analysis, and discusses its results.

  • 4.
    Buschle, Markus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Franke, Ulrik
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Sommestad, Teodor
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    A Tool for Enterprise Architecture Analysis Using the PRM Formalism2011In: INFORMATION SYSTEMS EVOLUTION / [ed] Soffer P; Proper E, 2011, Vol. 72, p. 108-121Conference paper (Refereed)
    Abstract [en]

    Enterprise architecture advocates for model-based decision-making on enterprise-wide information system issues. In order to provide decision-making support, enterprise architecture models should not only be descriptive but also enable analysis. This paper presents a software tool, currently under development, for the evaluation of enterprise architecture models. In particular, the paper focuses on how to encode scientific theories so that they can be used for model-based analysis and reasoning under uncertainty. The tool architecture is described, and a case study shows how the tool supports the process of enterprise architecture analysis.

  • 5.
    Buschle, Markus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Franke, Ulrik
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Sommestad, Teodor
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    A tool for enterprise architecture analysis using the PRM formalism2010In: CEUR Workshop Proceedings, 2010Conference paper (Refereed)
    Abstract [en]

    Enterprise architecture advocates model-based decision-making on enterprise-wide information system issues. In order to provide decisionmaking support, enterprise architecture models should not only be descriptive but also enable analysis. This paper presents a software tool, currently under development, for the evaluation of enterprise architecture models. In particular, the paper focuses on how to encode scientific theories so that they can be used for model-based analysis and reasoning under uncertainty. The tool architecture is described, and a case study shows how the tool supports the process of enterprise architecture analysis.

  • 6.
    Canat, Mert
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Català, Nuria
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Jourkovski, Alexander
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Petrov, Svetlomir
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Wellme, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Enterprise Architecture and Agile Development: Friends or Foes?2018Conference paper (Refereed)
    Abstract [en]

    Nowadays, both agile development and enterprise architecture are often employed in large organizations. However there is still some confusion if these can and should be used together, and there is not much research about the possible interplay. The aim of this study is to bring new knowledge to the field of enterprise architecture and its relation to agile development. Twelve qualitative interviews with professionals in different roles, such as developers and architects, have been carried out. The participants belong to five different companies and the information obtained from them has been used to compare opinions and stated challenges regarding agile and EA. We found that some common opinions among the interviewees are; 1) agile development and enterprise architecture can be combined, 2) there are clear communication problems among architects, different teams, and project owners, and 3) there is a lack of system and application reusability. 

  • 7.
    Ekstedt, Mathias
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Afzal, Zeeshan
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Mukherjee, Preetam
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. Digital University Kerala, Thiruvananthapuram, India.
    Hacks, Simon
    Stockholm University, Stockholm, Sweden.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Yet another cybersecurity risk assessment framework2023In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 22, no 6, p. 1713-1729Article in journal (Refereed)
    Abstract [en]

    IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.

  • 8.
    Ekstedt, Mathias
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Franke, Ulrik
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johnson, Pontus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerstrom, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Sommestad, Teodor
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Buschle, Markus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    A Tool for Enterprise Architecture Analysis of Maintainability: CSMR 2009, PROCEEDINGS2009In: EUR CON SFTWR MTNCE REENGR / [ed] Winter A, Knodel J, Los Almitos: IEEE COMPUTER SOC , 2009, p. 327-328Conference paper (Refereed)
    Abstract [en]

    A tool for Enterprise Architecture analysis using a probabilistic mathematical framework is demonstrated. The Model-View-Controller tool architecture is outlined, before the use of the tool is considered. A sample abstract maintainability model is created, showing the dependence of system maintainability on documentation quality. developer expertise, etc. Finally, a concrete model of an ERP system is discussed.

  • 9.
    Ekstedt, Mathias
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johnson, Pontus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Enterprise Architecture Modeling and Analysis of Quality Attributes: The Multi-Attribute Prediction Language (MAPL)2015In: Proceedings of the 1st Scandinavian Workshop on the Engineering of Systems-of-Systems (SWESoS 2015) / [ed] Jakob Axelsson, SICS , 2015, p. 10-12Conference paper (Other academic)
    Download full text (pdf)
    SWESoS proceedings
  • 10.
    Ekstedt, Mathias
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johnson, Pontus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Gorton, Dan
    Foreseeti AB, Sweden.
    Nydren, Joakim
    Foreseeti AB, Sweden.
    Shahzad, Khurram
    Foreseeti AB, Sweden.
    securiCAD by foreseeti: A CAD tool for enterprise cyber security management2015In: Proceedings of the 2015 IEEE 19th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2015, 2015Conference paper (Refereed)
    Abstract [en]

    This paper presents a CAD tool for enterprise cyber security management called securiCAD. It is a software developed during ten years of research at KTH Royal Institute of Technology, and it is now being commercialized by foreseeti (a KTH spin-off company). The idea of the tool is similar to CAD tools used when engineers design and test cars, buildings, etc. Specifically, the securiCAD user first models the IT environment, an existing one or one under development, and then securiCAD, using attack graphs, calculates and highlights potential weaknesses and avenues of attacks. The main benefits with securiCAD are; 1) built in security expertise, 2) visualization, 3) holistic security assessments, and 4) scenario comparison (decision-making) capabilities.

  • 11.
    Ekstedt, Mathias
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Närmen, Per
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johnson, Pontus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Chenine, Moustafa
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Setting the Information Systems Goals2007In: Enterprise Architecture: Models and Analyses for Information Systems Decision Making, Studentlitteratur, 2007, p. 92-152Chapter in book (Other academic)
  • 12. Elsner, D.
    et al.
    Khosroshahi, P. A.
    MacCormack, A. D.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Multivariate unsupervised machine learning for anomaly detection in enterprise applications2019In: Proceedings of the Annual Hawaii International Conference on System Sciences, IEEE Computer Society , 2019, p. 5827-5836Conference paper (Refereed)
    Abstract [en]

    Existing application performance management (APM) solutions lack robust anomaly detection capabilities and root cause analysis techniques, that do not require manual efforts and domain knowledge. In this paper, we develop a density-based unsupervised machine learning model to detect anomalies within an enterprise application, based upon data from multiple APM systems. The research was conducted in collaboration with a European automotive company, using two months of live application data. We show that our model detects abnormal system behavior more reliably than a commonly used outlier detection technique and provides information for detecting root causes. 

  • 13.
    Engström, Viktor
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Johnson, Pontus
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ringdahl, Erik
    Foreseeti AB, Sweden.
    Wällstedt, Max
    Foreseeti AB, Sweden.
    Automated Security Assessments of Amazon Web Service Environments2022In: ACM Transactions on Privacy and Security, ISSN 2471-2566, Vol. 26, no 2, p. 1-31, article id 20Article in journal (Refereed)
    Abstract [en]

    Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing cloud operations, especially at large scales, can quickly become intractable. Customer-side issues such as service misconfigurations, data breaches, and insecure changes are prevalent. Furthermore, cloud-specific tactics and techniques paired with application vulnerabilities create a large and complex search space. Various solutions and modeling languages for cloud security assessments exist. However, no single one appeared sufficiently cloud-centered and holistic. Many also did not account for tactical security dimensions. This article, therefore, presents a domain-specific modeling language for AWS environments. When used to model AWS environments, manually or automatically, the language automatically constructs and traverses attack graphs to assess security. Assessments, therefore, require minimal security expertise from the user. The modeling language was primarily tested on four third-party AWS environments through securiCAD Vanguard, a commercial tool built around the AWS modeling language. The language was validated further by measuring performance on models provided by anonymous end users and a comparison with a similar open source assessment tool. As of March 2020, the modeling language could represent essential AWS structures, cloud tactics, and threats. However, the tests highlighted certain shortcomings. Data collection steps, such as planted credentials, and some missing tactics were obvious. Nevertheless, the issues covered by the DSL were already reminiscent of common issues with real-world precedents. Future additions to attacker tactics and addressing data collection should yield considerable improvements.

  • 14.
    Engström, Viktor
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. KTH, School of Electrical Engineering and Computer Science (EECS), Centres, Centre for Cyber Defence and Information Security CDIS.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Two decades of cyberattack simulations: A systematic literature review2022In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 116, p. 102681-102681, article id 102681Article in journal (Refereed)
    Abstract [en]

    Cyberattack simulations appear across multiple computer security domains and are interpreted in many different but equally viable ways. However, this makes the topic appear fragmented and inconsistent, making it challenging to identify and communicate relevant research. Therefore, this article contributes to a unified baseline by presenting the results of a systematic literature review. The review targeted attack simulations published between 1999 and 2019, specifically those exploring which specific steps result in successful attacks. The search initially produced 647 articles, later reduced to 11 key contributions. Despite being scattered across application domains, their general aims, contributions, and problem statements were remarkably similar. This was despite them generally not citing each other or a common body of work. However, the attack simulations differed in implementation details, such as modeling techniques, attacker decision-making, and how time is incorporated. How to construct a fully unified view of the entire topic is still somewhat unclear, particularly from the 11 articles. However, the results presented here should help orient practitioners and researchers interested in attack simulations regarding both present and future work. Particularly since, despite the seemingly implausible sample, the cumulative evidence suggests that attack simulations have yet to be pursued as a distinct research topic.

  • 15.
    Franke, Ulrik
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Saat, Jan
    Winter, Robert
    Trends in Enterprise Architecture Practice: A Survey2010In: Lecture Notes in Business Information Processing / [ed] Proper E; Lankhorst MM; Schonherr M; Barjis J; Overbeek S, 2010, Vol. 70, p. 16-29Conference paper (Refereed)
    Abstract [en]

    In recent years, Enterprise Architecture (EA) has become a discipline for business and IT-system management. While much research focuses on theoretical contributions related to EA, very few studies use statistical tools to analyze empirical data. This paper investigates the actual application of EA, by giving a broad overview of the usage of enterprise architecture in Swedish, German, Austrian and Swiss companies. 162 EA professionals answered a survey originally focusing on the relation between IT/business alignment (ITBA) and EA. The dataset provides answers to questions such as: For how many years have companies been using EA models, tools, processes and roles? How is ITBA in relation to EA perceived at companies? In particular, the survey has investigated quality attributes of EA, related to IT-systems, business and IT governance. One important result is some interesting correlations between how these qualities are prioritized. For example, a high concern for interoperability correlates with a high concern for maintainability.

  • 16.
    Franke, Ulrik
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Höök, David
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    König, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Närman, Per
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Gustafsson, Pia
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    EAF(2) - A Framework for Categorizing Enterprise Architecture Frameworks2009In: SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, LOS ALAMITOS: IEEE COMPUTER SOC , 2009, p. 327-332Conference paper (Refereed)
    Abstract [en]

    What constitutes an enterprise architecture framework is a contested subject. The contents of present enterprise architecture frameworks thus differ substantially. This paper aims to alleviate the confusion regarding which framework contains what by proposing a meta framework for enterprise architecture frameworks. By using this meta framework, decision makers are able to express their requirements on what their enterprise architecture framework must contain and also to evaluate whether the existing frameworks meets these requirements. An example classification of common EA frameworks illustrates the approach.

  • 17.
    Franke, Ulrik
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johnson, Pontus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Höök, David
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    König, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    A formal method for cost and accuracy trade-off analysis in software assessment measures2009In: RCIS 2009: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, NEW YORK: IEEE , 2009, p. 295-302Conference paper (Refereed)
    Abstract [en]

    Creating accurate models of information systems is an important but challenging task. It is generally well understood that such modeling encompasses general scientific issues, but the monetary aspects of the modeling of software systems are not equally well acknowledged. The present paper describes a method using Bayesian networks for optimizing modeling strategies, perceived as a trade-off between these two aspects. Using GeNIe, a graphical tool with the proper Bayesian algorithms implemented, decision support can thus be provided to the modeling process. Specifically, an informed trade-off can be made, based on the modeler's prior knowledge of the predictive power of certain models, combined with his projection of their costs. It is argued that this method might enhance modeling of large and complex software systems in two principal ways: Firstly, by enforcing rigor and making hidden assumptions explicit. Secondly, by enforcing cost awareness even in the early phases of modeling. The method should be used primarily when the choice of modeling can have great economic repercussions.

  • 18.
    Franke, Ulrik
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johnson, Pontus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Höök, David
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    König, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    A Method for Choosing Software Assessment Measures using Bayesian Networks and Diagnosis: CSMR 2009, PROCEEDINGS2009In: 13TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING: CSMR 2009, PROCEEDINGS / [ed] Winter A, Knodel J, LOS ALAMITOS, CA.: IEEE COMPUTER SOC. , 2009, p. 241-245Conference paper (Refereed)
    Abstract [en]

    Creating accurate models of information systems is an important but challenging task. While the scienti c aspects of such modeling are generally acknowledged, the monetary aspects of the modeling of software systems are not. The present paper describes a Bayesian method for optimizing modeling strategies, perceived as a trade-off between these two aspects. Speci cally, an informed trade-off can be made, based on the modeler's prior knowledge of the predictive power of certain models, combined with her projection of the costs. It is argued that this method enhances modeling of large and complex software systems in two principal ways: Firstly, by enforcing rigor and making hidden assumptions explicit. Secondly, by enforcing cost awareness even in the early phases of modeling. The method should be used primarily when the choice of modeling can have great economic repercussions.

  • 19.
    Franke, Ulrik
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ullberg, Johan
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Sommestad, Teodor
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Johnson, Pontus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Decision Support oriented Enterprise Architecture Metamodel Management using Classification Trees2009In: 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009) / [ed] Tosic, V., NEW YORK: IEEE , 2009, p. 328-335Conference paper (Refereed)
    Abstract [en]

    Models are an integral part of the discipline of Enterprise Architecture (EA). To stay relevant to management decision-making needs, the models need to be based upon suitable metamodels. These metamodels, in turn, need to be properly and continuously maintained. While there exists several methods for metamodel development and maintenance, these typically focus on internal metamodel qualities and metamodel engineering processes, rather than on the actual decision-making needs and their impact on the metamodels used. The present paper employs techniques from information theory and learning classification trees to propose a method for metamodel management based upon the value added by entities and attributes to the decision-making process. This allows for the removal of those metamodel parts that give the least "bang for the bucks" in terms of decision support. The method proposed is illustrated using real data from an ongoing research project on systems modifiability

  • 20.
    Gingnell, Liv
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ericsson, Evelina
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lilliesköld, Joakim
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    A Case Study on Product Development Performance Measurement2012In: Proceedings of The 2012 International Conference on Innovation, Management and Technology, 2012Conference paper (Refereed)
    Abstract [en]

    This paper presents a case study that evaluates the performance of the product development performance measurement system used in a Swedish company that is a part of a global corporate group. The study is based on internal documentation and eighteen indepth interviews with stakeholders involved in the product development process. The results from the case study include a description of what metrics that are in use, how these are employed, and its effect on the quality of the performance measurement system. Especially, the importance of having a well-defined process proved to have a major impact on the quality of the performance measurement system in this particular case.

  • 21.
    Gingnell, Liv
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ericsson, Evelina
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lilliesköld, Joakim
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    STRATEGIC PERFORMANCE MEASUREMENT IN PRODUCT DEVELOPMENT: A case study on a Swedish company2012Conference paper (Refereed)
    Abstract [en]

    Performance evaluation of product development processes is becoming increasingly important as many companies experience tougher competition and shorter product life cycles. This article, based on a case study on a Swedish company investigates the needs and requirements that the company have on a future performance measurement system for product development. The requirements were found to mostly consider cooperation between functions, co-worker motivation and cost-efficient product solutions. These focus areas are common problems in product development since they are addressed in development concepts like Lean Product Development and Design for Six Sigma. Therefore, more research about how they can be supported by performance measurement system for product development would be of interest.

    Download full text (pdf)
    Gingnell et al_Strategic performance measurement in product development
  • 22.
    Gingnell, Liv
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Franke, Ulrik
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ericsson, Evelina
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lilliesköld, Joakim
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Quantifying Success Factors for IT Projects-An Expert-Based Bayesian Model2014In: Information systems management, ISSN 1058-0530, E-ISSN 1934-8703, Vol. 31, no 1, p. 21-36Article in journal (Refereed)
    Abstract [en]

    Large investments are made annually to develop and maintain IT systems. Successful outcome of IT projects is therefore crucial for the economy. Yet, many IT projects fail completely or are delayed or over budget, or they end up with less functionality than planned. This article describes a Bayesian decision-support model. The model is based on expert elicited data from 51 experts. Using this model, the effect management decisions have upon projects can be estimated beforehand, thus providing decision support for the improvement of IT project performance.

    Download full text (pdf)
    fulltext
  • 23.
    Grenfeldt, Mattias
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Olofsson, Asta
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Engström, Viktor
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Attacking Websites Using HTTP Request Smuggling: Empirical Testing of Servers and Proxies2021In: 2021 IEEE 25th International Enterprise Distributed Object Computing Conference (EDOC), Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 173-181Conference paper (Refereed)
    Abstract [en]

    Securing web servers and proxies is critical for enterprise networks. Such Internet-facing systems make up a significant portion of the remote attack surface and, thus, serve as prime targets. HTTP Request Smuggling (HRS) is a vulnerability that arises when web servers and proxies interpret the length of a single HTTP request differently. In this study, empirical testing was used to find parsing behaviors that could lead to HRS in six popular proxies and six servers. A literature study was conducted to compile a corpus containing requests adopting all known HRS techniques and different variations. A test harness was built to enable the automatic sending of requests and recording of responses. The responses were then manually analyzed to identify behaviors vulnerable to HRS. In total, 19 vulnerable behaviors were found, and by combining the proxies with the servers, two almost full and four full attacks could be performed. At least one behavior that went against the HTTP specification was found in every system tested. However, not all of these behaviors enabled HRS. In conclusion, most proxies had strict parsing and did not accept requests that could lead to HRS. The servers, however, were not so strict.

  • 24. Guerreiro, Sérgio
    et al.
    Guédria, Wided
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    van Kervel, Steven
    A Meta Model for interoperability of Secure Business Transaction using BlockChain and DEMO2017Conference paper (Refereed)
    Abstract [en]

    Business transactions executed between organizations and individuals are largely operated on digital environments, conducting to an industrial interoperability challenge demanding secure environments to cooperate safely, therefore increasing credibility, and trust ability between end-users. This paper conceptualizes and prescribes a fine-grained control solution for the execution of business transactions involving critical assets, and using a human-based coordination and interaction design to minimize the negative impacts of security risks, the non-conformable operation and the coarse-grained control. This solution integrates the DEMO-based Enterprise Operating System (EOS) with BlockChain as a way to redesign, and distribute globally, a set of services that are founded in a human-oriented approach, and therefore, offering trust, authenticity, resilience, robustness against fraud and identification and mitigation of risk. The impacts for organizations and individuals are manifold: a security risk-based solution for end-users with budgetary constraints; educate on cyber security issues; and augment the trust for digital business processes environments.

  • 25.
    Hacks, Simon
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Butun, Ismail
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Buhaiu, Andrei
    Swedish Defence University.
    Georgiadou, Anna
    National Technical University of Athens.
    Michalitsi Psarrou, Ariadni
    National Technical University of Athens.
    Integrating Security Behavior into Attack Simulations2021In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Association for Computing Machinery , 2021Conference paper (Refereed)
    Abstract [en]

    The increase of cyber-attacks raised security concerns for critical assets worldwide in the last decade. Leading to more efforts spent towards increasing the cyber security among companies and countries. For the sake of enhancing cyber security, representation and testing of attacks have prime importance in understanding system vulnerabilities. One of the available tools for simulating attacks on systems is the Meta Attack Language (MAL), which allows representing the effects of certain cyber-attacks. However, only understanding the component vulnerabilities is not enough in securing enterprise systems. Another important factor is the "human", which constitutes the biggest "insider threat". For this, Security Behavior Analysis (SBA) helps understanding which system components that might be directly affected by the "human". As such, in this work, the authors present an approach for integrating user actions, so called "security behavior", by mapping SBA to a MAL-based language through MITRE ATT&CK techniques.

    Download full text (pdf)
    fulltext
  • 26.
    Hacks, Simon
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Hacks, Alexander
    Universität Duisburg-Essen, Duisburg, Germany.
    Katsikeas, Sotirios
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Klaer, Benedikt
    Institute for High Voltage Technology, RWTH Aachen University, Aachen, Germany.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases2019In: Proceeding of the 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC), IEEE, 2019Conference paper (Refereed)
    Abstract [en]

    Cyber-attacks on power assets can have disastrous consequences for individuals, regions, and whole nations. In order to respond to these threats, the assessment of power grids' and plants' cyber security can foster a higher degree of safety for the whole infrastructure dependent on power. Hitherto, we propose the use of attack simulations based on system architecture models. To reduce the effort of creating new attack graphs for each system of a given type, domain-specific attack languages may be employed. They codify common attack logics of the considered domain. Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework to develop domain specific attack languages. We extend the tool set of MAL by developing an approach to model security domains in ArchiMate notation. Next, those models are used to create a MAL instance, which reflects the concepts modeled in ArchiMate. These instances serve as input to simulate attacks on certain systems. To show the applicability of our approach, we conduct two case studies in the power domain. On the one hand, we model a thermal power plant and possible attacks on it. On the other hand, we use the attack on the Ukrainian power grid for our case study.

    Download full text (pdf)
    fulltext
  • 27.
    Hacks, Simon
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Katsikeas, Sotirios
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ling, Engla
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    powerLang: a probabilistic attack simulation language for the power domain2020In: Energy Informatics, ISSN 2520-8942, Vol. 3, no 1Article in journal (Refereed)
    Abstract [en]

    Cyber-attacks these threats, the cyber security assessment of IT and OT infrastructures can foster a higher degree of safety and resilience against cyber-attacks. Therefore, the use of attack simulations based on system architecture models is proposed. To reduce the effort of creating new attack graphs for each system under assessment, domain-specific languages (DSLs) can be employed. DSLs codify the common attack logics of the considered domain.Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework to develop DSLs and generate attack graphs for modeled infrastructures. In this article, powerLang as a MAL-based DSL for modeling IT and OT infrastructures in the power domain is proposed. Further, it allows analyzing weaknesses related to known attacks. To comprise powerLang, two existing MAL-based DSL are combined with a new language focusing on industrial control systems (ICS). Finally, this first version of the language was validated against a known cyber-attack.

  • 28. Hacks, Simon
    et al.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ritter, Daniel
    Towards Automated Attack Simulations of BPMN-based Processes2021Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 29.
    Heiding, Fredrik
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Katsikeas, Sotirios
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Research communities in cyber security vulnerability assessments: A comprehensive literature review2023In: Computer Science Review, ISSN 1574-0137, E-ISSN 1876-7745, Vol. 48, article id 100551Article, review/survey (Refereed)
    Abstract [en]

    Ethical hacking and vulnerability assessments are gaining rapid momentum as academic fields of study. Still, it is sometimes unclear what research areas are included in the categories and how they fit into the traditional academic framework. Previous studies have reviewed literature in the field, but the attempts use manual analysis and thus fail to provide a comprehensive view of the domain. To better understand how the area is treated within academia, 537,629 related articles from the Scopus database were analyzed. A Python script was used for data mining as well as analysis of the data, and 23,459 articles were included in the final synthesis. The publication dates of the articles ranged from 1975 to 2022. They were authored by 53,495 authors and produced an aggregated total of 836,956 citations. Fifteen research communities were detected using the Louvain community detection algorithm: (smart grids, attack graphs, security testing, software vulnerabilities, Internet of Things (IoT), network vulnerability, vulnerability analysis, Android, cascading failures, authentication, Software-Defined Networking (SDN), spoofing attacks, malware, trust models, and red teaming). In addition, each community had several individual subcommunities, constituting a total of 126. From the trends of the analyzed studies, it is clear that research interest in ethical hacking and vulnerability assessment is increasing.

  • 30.
    Heiding, Fredrik
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ethical Principles for Designing Responsible Offensive Cyber Security Training2020In: Privacy and Identity 2020, 2020, p. 21-39Conference paper (Refereed)
    Abstract [en]

    In this paper we present five principles for designing ethically responsible offensive cyber security training. The principles can be implemented in existing or new study plans and target both academic and non-academic courses. Subject matter experts within various cyber security domains were consulted to validate and fine tune the principles, together with a literature review of ethical studies in related domains. The background for designing the principles is the continuous popularity of offensive cyber security (penetration testing, ethical hacking). Offensive cyber security means actively trying to break or compromise a system in order to find its vulnerabilities. If this expertise is placed in the wrong hands, the person can cause severe damage to organizations, civilians and society at large. The proposed ethical principles are created in order to mitigate these risks while maintaining the upsides of offensive cyber security. This is achieved by incorporating the ethical principles in offensive cyber security training, in order to facilitate the practitioners with ethical knowledge of how and when to use their acquired expertise.

    Download full text (pdf)
    fulltext
  • 31.
    Heiding, Fredrik
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Wallström, Andreas
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Omer, Mohammad-Ali
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study2020In: Proceedings of the 6th International Conference on Information Systems Security and Privacy 2020, INSTICC , 2020, p. 424-431Conference paper (Refereed)
    Abstract [en]

    IoT (Internet of Things) devices have grown exponentially in the last years, both in the sheer number of devices and concerning areas of applications being introduced. Together with this rapid development we are faced with an increased need for IoT Security. Devices that have previously been analogue, such as refrigerators, door locks, and cars are now turning digital and are exposed to the threats posed by an Internet connection. This paper investigates how two existing security features (geographic IP Blocking with GeoIP and rate-limited connections with fail2ban) can be used to enhance the security of IoT devices. We analyze the success of each method by comparing units with and without the security features, collecting and comparing data about the received attacks for both kinds. The result shows that the GeoIP security feature can reduce attacks by roughly 93% and fail2ban by up to 99%. Further work in the field is encouraged to validate our findings, create better GeoIP tools, and to better understand the potential of the security techniques at a larger scale. The security features are implemented in aws instances made to simulate IoT devices, and measured with honeypots and IDSs (Intrusion Detection Systems) that collect data from the received attacks. The research is made as a fundamental work to later be extended by implementing the security features in more devices, such as single board computers that will simulate IoT devies even more accurately.

    Download full text (pdf)
    fulltext
  • 32.
    Heiding, Fredrik
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Süren, Emre
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Olegård, Johannes
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. Stockholm Univ, Stockholm, Sweden..
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Penetration testing of connected households2023In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 126, article id 103067Article in journal (Refereed)
    Abstract [en]

    Connected devices have become an integral part of modern homes and household devices, such as vac-uum cleaners and refrigerators, are now often connected to networks. This connectivity introduces an entry point for cyber attackers. The plethora of successful cyber attacks against household IoT indicates that the security of these devices, or the security of applications related to these devices, is often lacking. Existing penetration testing studies usually focus on individual devices, and recent studies often men-tion the need for more extensive vulnerability assessments. Therefore, this study investigates the cyber security of devices commonly located in connected homes. Systematic penetration tests were conducted on 22 devices in five categories related to connected homes: smart door locks, smart cameras, smart car adapters/garages, smart appliances, and miscellaneous smart home devices. In total, 17 vulnerabilities were discovered and published as new CVEs. Some CVEs received critical severity rankings from the National Vulnerability Database (NVD), reaching 9.8/10. The devices are already being sold and used worldwide, and the discovered vulnerabilities could lead to severe consequences for residents, such as an attacker gaining physical access to the house. In addition to the published CVEs, 52 weaknesses were discovered that could potentially lead to new CVEs in the future. To our knowledge, this is the most comprehensive study on penetration testing of connected household products.

  • 33.
    Heiser, Franz
    et al.
    Ericsson.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Addibpour, Mattin
    Ericsson.
    Revealing Hidden Structures in Organizational Transformation: A Case Study2015Conference paper (Refereed)
    Abstract [en]

    EA initiatives are usually spanning the entire enterprise on high level. While, a typical development organization (could be a business unit within a larger enterprise) often has detailed models describing their product, the enterprise architecture on the business unit level is handled in an ad hoc or detached way. However, research shows that there is a tight link between the product architecture and its developing organization. In this paper we have studied an organization within Ericsson, which focuses on the development of large software and hardware products. We have applied the hidden structure method, which is based on the Design Structure Matrix approach, to analyze of organizational transformations. The to-be scenarios are possible alternatives in trying to become more agile and lean. Our analysis shows that one scenario likely increases the complexity of developing the product, while the other two suggestions are both promising to-be scenarios.

  • 34.
    Hjalmarsson, Alexander
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Korman, Matus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling2013In: CEUR Workshop Proceedings, 2013, p. 39-48Conference paper (Refereed)
    Abstract [en]

    Large amounts of software are running on what is considered to be legacy platforms. These systems are often business critical and cannot be phased out without a proper replacement. Migration of these legacy applications can be troublesome due to poor documentation and a changing workforce. Estimating the costof suchprojects is nontrivial. Expert estimationis the most common method, but the method is heavily relying on the experience, knowledge,and intuition of the estimator. The use of a complementary estimation method can increase the accuracy of the assessment. This paper presents a metamodel that combines enterprise architecture modeling concepts with the COCOMO II estimation model. Ourstudy proposes a method combining expert estimation with the metamodel-based approachtoincrease the estimation accuracy. The combination was tested with four project samples at a large Nordic manufacturing company, which resulted in a mean magnitude of relative error of 10%.

  • 35.
    Holm, Hannes
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Buschle, Markus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Automatic data collection for enterprise architecture models2014In: Software and Systems Modeling, ISSN 1619-1366, E-ISSN 1619-1374, Vol. 13, no 2, p. 825-841Article in journal (Refereed)
    Abstract [en]

    Enterprise Architecture (EA) is an approach used to provide decision support based on organization-wide models. The creation of such models is, however, cumbersome as multiple aspects of an organization need to be considered, making manual efforts time-consuming, and error prone. Thus, the EA approach would be significantly more promising if the data used when creating the models could be collected automatically-a topic not yet properly addressed by either academia or industry. This paper proposes network scanning for automatic data collection and uses an existing software tool for generating EA models (ArchiMate is employed as an example) based on the IT infrastructure of enterprises. While some manual effort is required to make the models fully useful to many practical scenarios (e.g., to detail the actual services provided by IT components), empirical results show that the methodology is accurate and (in its default state) require little effort to carry out.

  • 36.
    Honeth, Nicholas
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Buschle, Markus
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Sasi, K. K.
    Electrical and Electronics Engineering, Amrita University, Coimbatore India.
    Nithin, S.
    Electrical and Electronics Engineering, Amrita University, Coimbatore India.
    An Extended ArchiMate Metamodel for Microgrid Control System Architectures2012Conference paper (Refereed)
    Abstract [en]

    Management of various Distributed Energy Resources (DERs) in microgrids requires the integration of heterogeneous control devices and systems. Design and management of such integrated systems would benefit from the application of models that capture structural and functional aspects. These models are important in order to abstract the technical detail for planning and design in order to provide a basis for discussion amongst stakeholders and technical experts. Such models should provide semantics that adequately describe and define these aspects from the electro-technical to the information management perspective during design and implementation. In the discipline of IT management, Enterprise Architecture (EA) is a commonly used approach. The EA approach is typically based on metamodels with ArchiMate being one of the most well known. ArchiMate aims to enable holistic descriptions of businesses and their supporting IT using three layers, namely business, application and technology, from three perspectives, namely information, behavior and structure. While, invaluable for planning and management of large organizational IT, ArchiMate in its original form lacks the descriptive semantics required to specifically capture the high level of systems integration required for electrical process management. This paper proposes an extended ArchiMate metamodel for modeling microgrid components, the control systems, and the management and control of these integrated systems. The paper provides an example of how this can be applied to a proposed microgrid development project.

    Download full text (pdf)
    fulltext
  • 37.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Automatic Probabilistic Enterprise IT Architecture Modeling: a Dynamic Bayesian Networks Approach2016In: 2016 IEEE 20TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING WORKSHOP (EDOCW), IEEE, 2016, p. 122-129Conference paper (Refereed)
    Abstract [en]

    Enterprise architecture modeling and model maintenance are time-consuming and error-prone activities that are typically performed manually. This position paper presents new and innovative ideas on how to automate the modeling of enterprise architectures. We propose to view the problem of modeling as a probabilistic state estimation problem, which is addressed using Dynamic Bayesian Networks (DBN). The proposed approach is described using a motivating example. Sources of machine-readable data about Enterprise Architecture entities are reviewed.

  • 38.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Enterprise Information System Management2007In: Enterprise Architecture: Models and Analyses for Information Systems Decision Making, Studentlitteratur, 2007, p. 54-71Chapter in book (Other academic)
  • 39.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    The Enterprise and Its Information Systems2007In: Enterprise Architecture: Models and Analyses for Information Systems Decision Making, Studentlitteratur, 2007, p. 37-52Chapter in book (Other academic)
  • 40.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Simonsson, Mårten
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Enterprise Architecture at ACME Energy2007In: Enterprice Architecture: Models and Analyses for Information Systems Decision Making, Studentlitteratur, 2007, p. 293-306Chapter in book (Other academic)
  • 41.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Sommestad, Teodor
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
     Introduction2007In: Enterprise Architecture: Models and Analyses for Information Systems Decision Making, Studentlitteratur, 2007, p. 11--36Chapter in book (Other academic)
  • 42.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Närman, Per
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Gustafsson, Pia
    Selecting Enterprise Architecture Models2007In: Enterprise Architecture: Models and Analyses for Information Systems Decision Making, Studentlitteratur, 2007, p. 213-239Chapter in book (Other academic)
  • 43.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Gorton, Dan
    Foreseeti, Stockholm, Sweden.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Time between vulnerability disclosures: A measure of software product vulnerability2016In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 62, p. 278-295Article in journal (Refereed)
    Abstract [en]

    Time between vulnerability disclosure (TBVD) for individual analysts is proposed as a meaningful measure of the likelihood of finding a zero-day vulnerability within a given timeframe. Based on publicly available data, probabilistic estimates of the TBVD of various software products are provided. Sixty-nine thousand six hundred forty-six vulnerabilities from the National Vulnerability Database (NVD) and the SecurityFocus Vulnerability Database were harvested, integrated and categorized according to the analysts responsible for their disclosure as well as by the affected software products. Probability distributions were fitted to the TBVD per analyst and product. Among competing distributions, the Gamma distribution demonstrated the best fit, with the shape parameter, k, similar for most products and analysts, while the scale parameter, 8, differed significantly. For forecasting, autoregressive models of the first order were fitted to the TBVD time series for various products. Evaluation demonstrated that forecasting of TBVD on a per product basis was feasible. Products were also characterized by their relative susceptibility to vulnerabilities with impact on confidentiality, integrity and availability respectively. The differences in TBVD between products is significant, e.g. spanning differences of over 500% among the 20 most common software products in our data. Differences are further accentuated by the differing impact, so that, e.g., the mean working time between disclosure of vulnerabilities with a complete impact on integrity (as defined by the Common Vulnerability Scoring System) for Linux (110 days) exceeds that of Windows 7 (6 days) by over 18 times.

  • 44.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    A Meta Language for Threat Modeling and Attack Simulations2018In: ACM International Conference Proceeding Series, 2018Conference paper (Refereed)
    Abstract [en]

    Attack simulations may be used to assess the cyber security of systems. In such simulations, the steps taken by an attacker in order to compromise sensitive system assets are traced, and a time estimate may be computed from the initial step to the compromise of assets of interest. Attack graphs constitute a suitable formalism for the modeling of attack steps and their dependencies, allowing the subsequent simulation. To avoid the costly proposition of building new attack graphs for each system of a given type, domain-specific attack languages may be used. These languages codify the generic attack logic of the considered domain, thus facilitating the modeling, or instantiation, of a specific system in the domain. Examples of possible cyber security domains suitable for domain-specific attack languages are generic types such as cloud systems or embedded systems but may also be highly specialized kinds, e.g. Ubuntu installations; the objects of interest as well as the attack logic will differ significantly between such domains. In this paper, we present the Meta Attack Language (MAL), which may be used to design domain-specific attack languages such as the aforementioned. The MAL provides a formalism that allows the semi-automated generation as well as the efficient computation of very large attack graphs. We declare the formal background to MAL, define its syntax and semantics, exemplify its use with a small domain-specific language and instance model, and report on the computational performance.

  • 45.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Franke, Ulrik
    SICS.
    Can the Common Vulnerability Scoring System be Trusted?: A Bayesian Analysis2018In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 15, no 6, p. 1002-1015, article id 7797152Article in journal (Refereed)
    Abstract [en]

    The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for assessing software vulnerabilities. However, it has been criticized for lack of validity and practitioner relevance. In this paper, the credibility of the CVSS scoring data found in five leading databases – NVD, X-Force, OSVDB, CERT-VN, and Cisco – is assessed. A Bayesian method is used to infer the most probable true values underlying the imperfect assessments of the databases, thus circumventing the problem that ground truth is not known. It is concluded that with the exception of a few dimensions, the CVSS is quite trustworthy. The databases are relatively consistent, but some are better than others. The expected accuracy of each database for a given dimension can be found by marginalizing confusion matrices. By this measure, NVD is the best and OSVDB is the worst of the assessed databases.

  • 46.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Österlind, Magnus
    IT Managment with Enterprise Architecture2013Book (Other academic)
    Download full text (pdf)
    fulltext
  • 47.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
    Franke, U.
    Ekstedt, Mathias
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Modeling and analyzing systems-of-systems in the Multi-Attribute Prediction Language (MAPL)2016In: Proceedings - 4th International Workshop on Software Engineering for Systems-of-Systems, SESoS 2016, Association for Computing Machinery (ACM), 2016, p. 1-7Conference paper (Refereed)
    Abstract [en]

    The Multi-Attribute Prediction Language (MAPL), an analysis metamodel for non-functional qualities of systems-ofsystems, is introduced. MAPL features analysis in five nonfunctional areas: service cost, service availability, data accuracy, application coupling, and application size. In addition, MAPL explicitly includes utility modeling to make tradeoffs between the qualities. The paper introduces how each of the five non-functional qualities is modeled and quantitatively analyzed based on the ArchiMate standard for enterprise architecture modeling and the previously published Predictive, Probabilistic Architecture Modeling Framework, building on the well-known UML and OCL formalisms. The main contribution of MAPL lies in combining all five nonfunctional analyses into a single unified framework.

  • 48.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Närman, Per
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Simonsson, Marten
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Enterprise architecture analysis with extended influence diagrams2007In: Information Systems Frontiers, ISSN 1387-3326, E-ISSN 1572-9419, Vol. 9, no 2-3, p. 163-180Article in journal (Refereed)
    Abstract [en]

    The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the level of enterprise information security. This paper proposes the use of a formal language to support such analysis. Such a language needs to be able to represent causal relations between, and definitions of, various concepts as well as uncertainty with respect to both concepts and relations. To support decision making properly, the language must also allow the representation of goals and decision alternatives. This paper evaluates a number of languages with respect to these requirements, and selects influence diagrams for further consideration. The influence diagrams are then extended to fully satisfy the requirements. The syntax and semantics of the extended influence diagrams are detailed in the paper, and their use is demonstrated in an example.

  • 49.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Närman, Per
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Simonsson, Mårten
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Extended influence diagrams for enterprise architecture analysis2006In: 10th IEEE International Enterprise Distributed Object Computing Conference, Proceedings, 2006, p. 3-12Conference paper (Refereed)
    Abstract [en]

    The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the level of enterprise information security. This paper proposes the use of a formal language to support such analysis. Such a language needs to be able to represent causal relations between, and definitions of, various concepts as well as uncertainty with respect to both concepts and relations. To support decision-making properly, the language must also allow the representation of goals and decision alternatives. This paper evaluates a number of languages with respect to these requirements, and selects influence diagrams for further consideration. The influence diagrams are then extended to fully satisfy the requirements. The syntax and semantics of the extended influence diagrams are detailed in the paper, and their use is demonstrated in an example.

  • 50.
    Johnson, Pontus
    et al.
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Lagerström, Robert
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Närman, Per
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Simonsson, Mårten
    KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
    Extended Influence Diagrams for System Quality Analysis2007In: Journal of Software, E-ISSN 1796-217X, Vol. 2, no 3, p. 30-42Article in journal (Refereed)
    Abstract [en]

    Making major changes in enterprise information systems, such as large IT-investments, often have a significant impact on business operations. Moreover, when deliberating which IT-changes to make, the consequences of choosing a certain scenario may be difficult to grasp. One way to ascertain the quality of IT investment decisions is through the use of methods from decision theory. This paper proposes the use of one such method to facilitate IT-investment decision making, viz. extended influence diagrams. An extended influence diagram is a tool able to completely describe and analyse a decision situation. The applicability of extended influence diagrams is demonstrated at the end of the paper by using an extended influence diagram in combination with the ISO/IEC 9126 software quality characteristics and metrics as means to assist a decision maker in a decision regarding an IT-investment.

123 1 - 50 of 150
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf