Attacker Profiling in Quantitative Security Assessment Based on Attack Trees

作者: Aleksandr Lenin , Jan Willemson , Dyan Permata Sari

DOI: 10.1007/978-3-319-11599-3_12

关键词: Attack treeAdversarial systemComputer scienceSecurity assessmentIn real lifeFace (geometry)Data miningLimitingBoolean functionProfiling (computer programming)Theoretical computer science

摘要: … ) are quantitative annotations on … quantitative security assessment, attack trees, and attacker profiling. Section 3 describes motivation for the attacker profiling in security risk assessment. …

参考文章(29)
Ahto Buldas, Roman Stepanenko, Upper Bounds for Adversaries’ Utility in Attack Trees decision and game theory for security. pp. 98- 117 ,(2012) , 10.1007/978-3-642-34266-0_6
Shamal Faily, Ivan Fléchais, Barry is not the weakest link: eliciting secure system requirements with personas BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference. pp. 124- 132 ,(2010) , 10.14236/EWIC/HCI2010.17
Markus Schumacher, Security Engineering with Patterns ,(2003)
Aivo Jürgenson, Jan Willemson, Computing Exact Outcomes of Multi-parameter Attack Trees OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems. pp. 1036- 1051 ,(2008) , 10.1007/978-3-540-88873-4_8
Olav W. Bertelsen, Proceedings of the second Nordic conference on Human-computer interaction nordic conference on human computer interaction. ,(2002)
D. F. Haasl, N. H. Roberts, F. F. Goldberg, W. E. Vesely, Fault Tree Handbook ,(1987)
Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson, Rational Choice of Security Measures Via Multi-parameter Attack Trees Critical Information Infrastructures Security. pp. 235- 248 ,(2006) , 10.1007/11962977_19
Robert Meersman, Tharam Dillon, Pilar Herrero, On the Move to Meaningful Internet Systems: Otm 2010 ,(2011)