Extending a security ontology framework to model CAPEC attack paths and TAL adversary profiles | |
---|---|
Author | |
Abstract |
Security evaluation can be performed using a variety of analysis methods, such as attack trees, attack graphs, threat propagation models, stochastic Petri nets, and so on. These methods analyze the effect of attacks on the system, and estimate security attributes from different perspectives. However, they require information from experts in the application domain for properly capturing the key elements of an attack scenario: i) the attack paths a system could be subject to, and ii) the different characteristics of the possible adversaries. For this reason, some recent works focused on the generation of low-level security models from a high-level description of the system, hiding the technical details from the modeler. |
Year of Publication |
2022
|
Date Published |
sep
|
Publisher |
IEEE
|
Conference Location |
Zaragoza, Spain
|
ISBN Number |
978-1-66547-402-3
|
URL |
https://ieeexplore.ieee.org/document/9933301/
|
DOI |
10.1109/EDCC57035.2022.00016
|
Google Scholar | BibTeX | DOI |