메뉴 건너뛰기




Volumn 5, Issue 8, 2012, Pages 929-943

Attack countermeasure trees (ACT): Towards unifying the constructs of attack and defense trees

Author keywords

Attack trees; Mincuts; Non state space model; Return on attack; Return on investment

Indexed keywords

INVESTMENTS; NETWORK SECURITY; PROFITABILITY; STATE SPACE METHODS;

EID: 84864293887     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.299     Document Type: Article
Times cited : (138)

References (36)
  • 1
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo R, Deswarte Y, Kaâniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 1999; 25(5): 633-650.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 3
    • 71749094137 scopus 로고    scopus 로고
    • Dependability and security models. In Proceedings of DRCN, IEEE, 2009, 11-20.
    • Trivedi KS, Kim DS, Roy A, Medhi D. Dependability and security models. In Proceedings of DRCN, IEEE, 2009, 11-20.
    • Trivedi, K.S.1    Kim, D.S.2    Roy, A.3    Medhi, D.4
  • 4
    • 84864293182 scopus 로고    scopus 로고
    • Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA). In Proceedings of Fourth Workshop on the Economics of Information Security
    • Cremonini M, Martini P. Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA). In Proceedings of Fourth Workshop on the Economics of Information Security, 2005.
    • (2005)
    • Cremonini, M.1    Martini, P.2
  • 5
    • 33947420435 scopus 로고    scopus 로고
    • A risk-driven security analysis method and modelling language
    • Kearney P, Brügger L. A risk-driven security analysis method and modelling language. BT Technology Journal 2007; 25(1): 141-153.
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 141-153
    • Kearney, P.1    Brügger, L.2
  • 7
    • 84947612185 scopus 로고    scopus 로고
    • Attack Modeling for Information Security and Survivability," CMU/SEI-2001-TN-001
    • Moore AP, Ellison RJ, Linger RC. "Attack Modeling for Information Security and Survivability, " CMU/SEI-2001-TN-001, 2001.
    • (2001)
    • Moore, A.P.1    Ellison, R.J.2    Linger, R.C.3
  • 9
    • 33750958509 scopus 로고    scopus 로고
    • Defense trees for economic evaluation of security investments. In Proceedings of ARES
    • Bistarelli S, Peretti P, Trubitsyna I. Defense trees for economic evaluation of security investments. In Proceedings of ARES, 2006; 8-15.
    • (2006) , pp. 8-15
    • Bistarelli, S.1    Peretti, P.2    Trubitsyna, I.3
  • 10
    • 70450092394 scopus 로고    scopus 로고
    • RRE: a game-theoretic intrusion response and recovery engine. In Proceedings of DSN
    • Zonouz SA, Khurana H, Sanders WH, Yardley TM. RRE: a game-theoretic intrusion response and recovery engine. In Proceedings of DSN, 2009; 439-448.
    • (2009) , pp. 439-448
    • Zonouz, S.A.1    Khurana, H.2    Sanders, W.H.3    Yardley, T.M.4
  • 11
    • 84947615620 scopus 로고
    • The optimal control of partially observable Markov processes," Ph.D. dissertation, Stanford Univ. Electronics Labs
    • Sondik E. "The optimal control of partially observable Markov processes, " Ph.D. dissertation, Stanford Univ. Electronics Labs, 1971.
    • (1971)
    • Sondik, E.1
  • 14
    • 84864293189 scopus 로고    scopus 로고
    • An Attack Tree for the Border Gateway Protocol. Cisco Internet Draft
    • Convery S, Cook D, Franz M. An Attack Tree for the Border Gateway Protocol. Cisco Internet Draft, 2002.
    • (2002)
    • Convery, S.1    Cook, D.2    Franz, M.3
  • 15
    • 84864302708 scopus 로고    scopus 로고
    • Supervisory Control and Data Acquisition (SCADA) Systems. The Critical Infrastructure Protection Report 1.6
    • Baker GH, Berg A. Supervisory Control and Data Acquisition (SCADA) Systems. The Critical Infrastructure Protection Report 1.6, 2002.
    • (2002)
    • Baker, G.H.1    Berg, A.2
  • 16
    • 33646134102 scopus 로고    scopus 로고
    • Developing an insider threat model using functional decomposition
    • LNCS 3685
    • Butts J, Mills R, Baldwin R. Developing an insider threat model using functional decomposition. Computer Network Security 2005; LNCS 3685: 412-417.
    • (2005) Computer Network Security , pp. 412-417
    • Butts, J.1    Mills, R.2    Baldwin, R.3
  • 17
    • 84864293190 scopus 로고
    • A system security engineering process. In Proceedings of the 14th National Computer Security Conference
    • Weiss JD. A system security engineering process. In Proceedings of the 14th National Computer Security Conference, 1991.
    • (1991)
    • Weiss, J.D.1
  • 20
    • 84860434875 scopus 로고    scopus 로고
    • A structural framework for modeling multi-stage network attacks. In Proceedings of ICPPW
    • Daley K, Larson R, Dawkins J. A structural framework for modeling multi-stage network attacks. In Proceedings of ICPPW, 2002; 1530-1536.
    • (2002) , pp. 1530-1536
    • Daley, K.1    Larson, R.2    Dawkins, J.3
  • 22
    • 84947613232 scopus 로고    scopus 로고
    • A Framework for Analyzing and Mitigating the Vulnerabilities of Complex Systems via Attack and Protection Trees," Ph.D. dissertation, Air Force Institute of Technology
    • Edge KS. "A Framework for Analyzing and Mitigating the Vulnerabilities of Complex Systems via Attack and Protection Trees, " Ph.D. dissertation, Air Force Institute of Technology, 2007.
    • (2007)
    • Edge, K.S.1
  • 23
    • 47349092109 scopus 로고    scopus 로고
    • A novel security risk evaluation for information systems. In Proceedings of FCST
    • Gan Z, Tang J, Wu P, Varadharajan V. A novel security risk evaluation for information systems. In Proceedings of FCST, 2007; 67-73.
    • (2007) , pp. 67-73
    • Gan, Z.1    Tang, J.2    Wu, P.3    Varadharajan, V.4
  • 24
    • 84864301460 scopus 로고    scopus 로고
    • Border gateway protocol security: Recommendations of the national institute of standards and technology. NIST Special Publication 800-54
    • Kuhn R, Sriram K, Montgomery D. Border gateway protocol security: Recommendations of the national institute of standards and technology. NIST Special Publication 800-54, 2007.
    • (2007)
    • Kuhn, R.1    Sriram, K.2    Montgomery, D.3
  • 25
    • 34548704917 scopus 로고    scopus 로고
    • Accurate real-time identification of IP prefix hijacking. In Proceedings of IEEE S & P
    • Hu X, Mao ZM. Accurate real-time identification of IP prefix hijacking. In Proceedings of IEEE S & P, 2007; 3-17.
    • (2007) , pp. 3-17
    • Hu, X.1    Mao, Z.M.2
  • 26
    • 0030104164 scopus 로고    scopus 로고
    • Comparing the importance of system components by some structural characteristics
    • Meng FC. Comparing the importance of system components by some structural characteristics. IEEE Transactions on Reliability, 1996; 45(1): 59-65.
    • (1996) IEEE Transactions on Reliability , vol.45 , Issue.1 , pp. 59-65
    • Meng, F.C.1
  • 27
    • 84989674615 scopus 로고
    • Optimal arrangement of components via pairwise rearrangements
    • Boland PJ, Proschan F, Tong YL. Optimal arrangement of components via pairwise rearrangements. Naval Research Logistics 1989; 36(6): 807-815.
    • (1989) Naval Research Logistics , vol.36 , Issue.6 , pp. 807-815
    • Boland, P.J.1    Proschan, F.2    Tong, Y.L.3
  • 28
    • 0037261651 scopus 로고    scopus 로고
    • Importance analysis with Markov chains. In Proceedings of Reliability and Maintainability Symposium IEEE
    • Fricks RM, Trivedi KS. Importance analysis with Markov chains. In Proceedings of Reliability and Maintainability Symposium IEEE, 2003; 89-95.
    • (2003) , pp. 89-95
    • Fricks, R.M.1    Trivedi, K.S.2
  • 30
    • 84947611454 scopus 로고    scopus 로고
    • A. Technologies, quot;Securitree,"
    • A. Technologies, "Securitree, " 2002.
    • (2002)
  • 31
    • 84947616451 scopus 로고    scopus 로고
    • A Practical Approach to Threat Modeling," Erudio Security, LLC, Tech. Rep.
    • Olzak T. "A Practical Approach to Threat Modeling, " Erudio Security, LLC, Tech. Rep., 2006.
    • (2006)
    • Olzak, T.1
  • 32
    • 0001162212 scopus 로고
    • On The Importance of Different Components in a Multicomponent System
    • In, Krishnaiah PR, ed). Academic Press: New York, NY, USA
    • Birnbaum ZW. On The Importance of Different Components in a Multicomponent System. In Multivariate Analysis - II, Krishnaiah PR, (ed). Academic Press: New York, NY, USA, 1969; 581-592
    • (1969) Multivariate Analysis - II , pp. 581-592
    • Birnbaum, Z.W.1
  • 33
    • 42749101387 scopus 로고    scopus 로고
    • Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection. In Proceedings of CCST
    • Higuero MV, Unzilla JJ, Jacob E, Saiz P, Aguado M, Luengo D. Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection. In Proceedings of CCST, 2005; 57-60.
    • (2005) , pp. 57-60
    • Higuero, M.V.1    Unzilla, J.J.2    Jacob, E.3    Saiz, P.4    Aguado, M.5    Luengo, D.6
  • 34
    • 84864318235 scopus 로고    scopus 로고
    • Modeling network attacks. In Proceedings of 12th Conference on Behavior Representation in Modeling and Simulation
    • Lathrop S, Hill J, Surdu J. Modeling network attacks. In Proceedings of 12th Conference on Behavior Representation in Modeling and Simulation, 2003; 401-407.
    • (2003) , pp. 401-407
    • Lathrop, S.1    Hill, J.2    Surdu, J.3
  • 35
    • 84947614302 scopus 로고    scopus 로고
    • I. Software, quot;Attacktree+,"
    • I. Software, "Attacktree+, " 2007.
    • (2007)
  • 36
    • 84864302711 scopus 로고    scopus 로고
    • Modeling internet attacks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and security, IEEE
    • Tidwell T, Larson R, Fitch K, Hale J. Modeling internet attacks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and security, vol. 59. IEEE, 2001.
    • (2001) , vol.59
    • Tidwell, T.1    Larson, R.2    Fitch, K.3    Hale, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.