Extending a security ontology framework to model CAPEC attack paths and TAL adversary profiles
Author
Abstract

Security evaluation can be performed using a variety of analysis methods, such as attack trees, attack graphs, threat propagation models, stochastic Petri nets, and so on. These methods analyze the effect of attacks on the system, and estimate security attributes from different perspectives. However, they require information from experts in the application domain for properly capturing the key elements of an attack scenario: i) the attack paths a system could be subject to, and ii) the different characteristics of the possible adversaries. For this reason, some recent works focused on the generation of low-level security models from a high-level description of the system, hiding the technical details from the modeler.

Year of Publication
2022
Date Published
sep
Publisher
IEEE
Conference Location
Zaragoza, Spain
ISBN Number
978-1-66547-402-3
URL
https://ieeexplore.ieee.org/document/9933301/
DOI
10.1109/EDCC57035.2022.00016
Google Scholar | BibTeX | DOI