SMART: security model adversarial risk-based tool for systems security design evaluation

被引:4
|
作者
Wortman, Paul A. [1 ]
Chandy, John A. [1 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
来源
JOURNAL OF CYBERSECURITY | 2020年 / 6卷 / 01期
关键词
system security modeling; security risk analysis; security metrics; security design exploration; ATTACK TREE; FRAMEWORK;
D O I
10.1093/cybsec/tyaa003
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
As development and deployment of secure systems continue to grow at scale, there is an equal need to evaluate these systems for vulnerabilities and other problems. However, the process of evaluating these designs is complicated and mainly proprietary to the group performing the evaluation. Generally, one follows the generic risk equation of probability and impact. In addition, one should examine the costs related to the adversary and the defender of a system. Without accounting for all of these different aspects, one cannot expect to properly assess the security of a system model or design. This work presents a security model adversarial risk-based tool (SMART) for systems security design evaluation. Our tool reads in a systems security model an attack graph and collects the necessary information for the purpose of determining the best solution based on a calculated security risk represented as a monetary amount. The advantage of the tool is the level of automation provided in the evaluation of security attack trees while providing meaningful metrics that are effortless to compare and contrast.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design
    Wortman, Paul A.
    Tehranipoor, Fatemeh
    Chandy, John A.
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [2] Risk-based Design Security Analysis
    Sion, Laurens
    Yskout, Koen
    Van Landuyt, Dimitri
    Joosen, Wouter
    [J]. 2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), 2018, : 11 - 18
  • [3] A Model For risk-Based adaptive security controls
    Calvo, Miguel
    Beltran, Marta
    [J]. COMPUTERS & SECURITY, 2022, 115
  • [4] IT Security: Risk-Based Prediction Tool and Method for Critical Infrastructures
    Aubert, Jocelyn
    Incoul, Christophe
    Khadraoui, Djamel
    [J]. ERCIM NEWS, 2010, (81): : 50 - 51
  • [5] Risks of risk-based security
    Parker, Donn B.
    [J]. COMMUNICATIONS OF THE ACM, 2007, 50 (03) : 120 - 120
  • [6] Risk-Based Security Requirements Model for Web Software
    Ezenwoye, Onyeka
    Liu, Yi
    [J]. 2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 232 - 237
  • [7] A Diagnostics Tool for Risk-based Dynamic Security Assessment of Renewable Generation
    Datta, Sohom
    Vittal, Vijay
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON PROBABILISTIC METHODS APPLIED TO POWER SYSTEMS (PMAPS), 2018,
  • [8] Risk-based systems security engineering: Stopping attacks with intention
    Evans, S
    Heinbuch, D
    Kyle, E
    Piorkowski, J
    Wallner, J
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (06) : 59 - 62
  • [9] A probabilistic risk-based security assessment tool allowing contingency forecasting
    Ciapessoni, E.
    Cirio, D.
    Pitto, A.
    Sforna, M.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON PROBABILISTIC METHODS APPLIED TO POWER SYSTEMS (PMAPS), 2018,
  • [10] Online risk-based security assessment
    Ni, M
    McCalley, JD
    Vittal, V
    Tayyib, T
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2003, 18 (01) : 258 - 265