TY - GEN
T1 - Adversary-driven state-based system security evaluation
AU - LeMay, Elizabeth
AU - Unkenholz, Willard
AU - Parks, Donald
AU - Muehrcke, Carol
AU - Keefe, Ken
AU - Sanders, William H.
N1 - Copyright:
Copyright 2010 Elsevier B.V., All rights reserved.
PY - 2010
Y1 - 2010
N2 - To provide insight on system security and aid decision-makers, we propose the ADversary VIew Security Evaluation (ADVISE) method to quantitatively evaluate the strength of a system's security. Our approach is to create an executable state-based security model of a system. The security model is initialized with information characterizing the system and the adversaries attacking the system. The model then simulates the attack behavior of the adversaries to produce a quantitative assessment of system security strength. This paper describes the system and adversary characterization data that are collected as input for the executable model. This paper also describes the simulation algorithms for adversary attack behavior and the computation for the probability that an attack attempt is successful. A simple case study illustrates how to analyze system security using the ADVISE method. A tool is currently under development to facilitate automatic model generation and simulation. The ADVISE method aggregates security-relevant information about a system and its adversaries to produce a quantitative security analysis useful for holistic system security decisions.
AB - To provide insight on system security and aid decision-makers, we propose the ADversary VIew Security Evaluation (ADVISE) method to quantitatively evaluate the strength of a system's security. Our approach is to create an executable state-based security model of a system. The security model is initialized with information characterizing the system and the adversaries attacking the system. The model then simulates the attack behavior of the adversaries to produce a quantitative assessment of system security strength. This paper describes the system and adversary characterization data that are collected as input for the executable model. This paper also describes the simulation algorithms for adversary attack behavior and the computation for the probability that an attack attempt is successful. A simple case study illustrates how to analyze system security using the ADVISE method. A tool is currently under development to facilitate automatic model generation and simulation. The ADVISE method aggregates security-relevant information about a system and its adversaries to produce a quantitative security analysis useful for holistic system security decisions.
UR - http://www.scopus.com/inward/record.url?scp=78649392653&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649392653&partnerID=8YFLogxK
U2 - 10.1145/1853919.1853926
DO - 10.1145/1853919.1853926
M3 - Conference contribution
AN - SCOPUS:78649392653
SN - 9781450303408
T3 - 6th International Workshop on Security Measurements and Metrics, MetriSec 2010
BT - 6th International Workshop on Security Measurements and Metrics, MetriSec 2010
T2 - 6th International Workshop on Security Measurements and Metrics, MetriSec 2010
Y2 - 15 September 2010 through 15 September 2010
ER -