DocumentCode :
3003415
Title :
Guiding Threat Analysis with Threat Source Models
Author :
Clark, K. ; Lee, C. ; Tyree, S. ; Hale, J.
Author_Institution :
US Mil. Acad., West Point
fYear :
2007
fDate :
20-22 June 2007
Firstpage :
262
Lastpage :
269
Abstract :
Threat analysis identifies how potential adversaries exploit system weaknesses to achieve their goals. Attack graphs are one method to conduct threat analysis by exposing vulnerability relationships, allowing administrators to pinpoint high risk paths. However, computational and cognitive complexity challenges must be dealt with. One method for managing threat analysis and attack graph complexity is to differentiate between likely and unlikely attack paths using threat source models. Threat source models are used during risk assessments to describe likely and unlikely adversary behavior, and so can be used for the same purpose during attack graph analysis. The framework presented here allows threat source models to guide attack graph generation to remove unlikely attack paths.
Keywords :
computational complexity; computer crime; risk management; adversary profiling; attack graphs; cognitive complexity; computational complexity; risk assessments; threat analysis; threat source models; Computer hacking; Conferences; Information analysis; Intelligent networks; Intrusion detection; Next generation networking; Risk analysis; Risk management; Scalability; Telecommunication traffic; adversary profiling; attack graphs; threat analysis; threat modeling; threat modeling analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
Conference_Location :
West Point, NY
Print_ISBN :
1-4244-1304-4
Electronic_ISBN :
1-4244-1304-4
Type :
conf
DOI :
10.1109/IAW.2007.381942
Filename :
4267570
Link To Document :
بازگشت