Title :
Guiding Threat Analysis with Threat Source Models
Author :
Clark, K. ; Lee, C. ; Tyree, S. ; Hale, J.
Author_Institution :
US Mil. Acad., West Point
Abstract :
Threat analysis identifies how potential adversaries exploit system weaknesses to achieve their goals. Attack graphs are one method to conduct threat analysis by exposing vulnerability relationships, allowing administrators to pinpoint high risk paths. However, computational and cognitive complexity challenges must be dealt with. One method for managing threat analysis and attack graph complexity is to differentiate between likely and unlikely attack paths using threat source models. Threat source models are used during risk assessments to describe likely and unlikely adversary behavior, and so can be used for the same purpose during attack graph analysis. The framework presented here allows threat source models to guide attack graph generation to remove unlikely attack paths.
Keywords :
computational complexity; computer crime; risk management; adversary profiling; attack graphs; cognitive complexity; computational complexity; risk assessments; threat analysis; threat source models; Computer hacking; Conferences; Information analysis; Intelligent networks; Intrusion detection; Next generation networking; Risk analysis; Risk management; Scalability; Telecommunication traffic; adversary profiling; attack graphs; threat analysis; threat modeling; threat modeling analysis;
Conference_Titel :
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
Conference_Location :
West Point, NY
Print_ISBN :
1-4244-1304-4
Electronic_ISBN :
1-4244-1304-4
DOI :
10.1109/IAW.2007.381942