The attack navigator

Journal Article (2016)
Author(s)

Christian W. Probst (Technical University of Denmark (DTU))

Jan Willemson (Cybernetica)

W Pieters (TU Delft - Safety and Security Science)

Safety and Security Science
Copyright
© 2016 Christian W. Probst, Jan Willemson, W. Pieters
DOI related publication
https://doi.org/10.1007/978-3-319-29968-6_1
More Info
expand_more
Publication Year
2016
Language
English
Copyright
© 2016 Christian W. Probst, Jan Willemson, W. Pieters
Safety and Security Science
Volume number
9390
Pages (from-to)
1-17
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions.

Files

License info not available