메뉴 건너뛰기




Volumn 7, Issue 3, 2013, Pages 363-373

The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures

Author keywords

Computer security; expert systems; risk analysis; supervisory control and data acquisition (SCADA) systems

Indexed keywords

COMPONENT LEVELS; ENTERPRISE SYSTEM; MODELING LANGUAGES; PROBABILISTIC INFERENCE; SECURITY DOMAINS; SECURITY PROFESSIONALS; SUPERVISORY CONTROL AND DATAACQUISITION SYSTEMS (SCADA); SYSTEM ARCHITECTURES;

EID: 84880572592     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2012.2221853     Document Type: Article
Times cited : (126)

References (66)
  • 1
    • 77955417822 scopus 로고    scopus 로고
    • A probabilistic relational model for security risk analysis
    • Mar.
    • T. Sommestad, M. Ekstedt, and P. Johnson, "A probabilistic relational model for security risk analysis," Comput. Security, vol. 29, no. 6, pp. 659-679, Mar. 2010.
    • (2010) Comput. Security , vol.29 , Issue.6 , pp. 659-679
    • Sommestad, T.1    Ekstedt, M.2    Johnson, P.3
  • 2
    • 47849098175 scopus 로고    scopus 로고
    • Probabilistic relational models
    • L. Getoor and B. Taskar, Eds. Cambridge, MA MIT Press
    • B. Taskar et al., "Probabilistic relational models," in Introduction to Statistical Relational Learning, L. Getoor and B. Taskar, Eds. Cambridge, MA: MIT Press, 2007, pp. 129-175.
    • (2007) Introduction to Statistical Relational Learning , pp. 129-175
    • Taskar, B.1
  • 3
    • 77950875313 scopus 로고    scopus 로고
    • Quantified security is a weak hypothesis: A critical survey of results and assumptions
    • V. Verendel, "Quantified security is a weak hypothesis: A critical survey of results and assumptions," in Proc. New Security Paradigms Workshop, 2009, pp. 37-49.
    • (2009) Proc. New Security Paradigms Workshop , pp. 37-49
    • Verendel, V.1
  • 5
    • 12244283592 scopus 로고    scopus 로고
    • Security metrics guide for information technology systems
    • NIST Special Publication Gaithersburg MD
    • M. Swanson et al., "Security metrics guide for information technology systems," National Instit. Standards Technol., NIST Special Publication 800-55, Gaithersburg, MD, 2003.
    • (2003) National Instit. Standards Technol. , pp. 800-855
    • Swanson, M.1
  • 6
    • 0006964066 scopus 로고    scopus 로고
    • Dr. Dobb's J Dec [Online]. Available
    • B. Schneier, "Attack trees: Modeling security threats," Dr. Dobb's J., Dec. 1999 [Online]. Available: http://www.drdobbs.com/attacktrees/ 184411129?queryText=%2522attack%2Btree%2522
    • (1999) Attack Trees: Modeling Security Threats
    • Schneier, B.1
  • 8
    • 77954331938 scopus 로고    scopus 로고
    • Beyond attack trees: Dynamic security modeling with Boolean logic driven Markov processes (BDMP)
    • L. Piètre-Cambacédès and M. Bouissou, "Beyond attack trees: Dynamic security modeling with Boolean logic driven Markov processes (BDMP)," in Proc. Eur. Dependable Comput. Conf., 2010, pp. 199-208.
    • (2010) Proc. Eur. Dependable Comput. Conf , pp. 199-208
    • Piètre-Cambacédès, L.1    Bouissou, M.2
  • 18
    • 84880573811 scopus 로고    scopus 로고
    • Toward unifying vulnerability information for attack graph construction
    • S. Roschke et al., "Toward unifying vulnerability information for attack graph construction," in Proc. 12th Int. Conf. Information Security, 2009, p. 233.
    • (2009) Proc. 12th Int. Conf. Information Security , pp. 233
    • Roschke, S.1
  • 20
    • 17744373483 scopus 로고    scopus 로고
    • Ph.D. dissertation Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA
    • O. M. Sheyner, "Scenario graphs and attack graphs," Ph.D. dissertation, Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA, 2004.
    • (2004) Scenario Graphs and Attack Graphs
    • Sheyner, O.M.1
  • 21
    • 84880570206 scopus 로고    scopus 로고
    • M. Eng. thesis, Dept. Electr. Eng. Comput. Sci., Massachusetts Instit. Technol., Cambridge, MA
    • R. Lippmann, "Netspa: A network security planning architecture," M.Eng. thesis, Dept. Electr. Eng. Comput. Sci., Massachusetts Instit. Technol., Cambridge, MA, 2002.
    • (2002) Netspa: A Network Security Planning Architecture
    • Lippmann, R.1
  • 22
    • 35148844598 scopus 로고    scopus 로고
    • Validating and restoring defense in depth using attack graphs
    • R. Lippmann et al., "Validating and restoring defense in depth using attack graphs," in Proc. MILCOM, 2006, p. 10.
    • (2006) Proc. MILCOM , pp. 10
    • Lippmann, R.1
  • 24
    • 66249091938 scopus 로고    scopus 로고
    • Advances in Topological Vulnerability Analysis
    • IEEE
    • S. Noel et al., Advances in Topological Vulnerability Analysis. Washington D.C.: IEEE, 2009, pp. 124-129.
    • (2009) Washington D.C. , pp. 124-129
    • Noel, S.1
  • 25
    • 56449105709 scopus 로고    scopus 로고
    • GARNET: A graphical attack graph and reachability network evaluation tool
    • K. Prole, Ed. Heidelberg/Berlin, Germany Springer
    • R. P. Lippmann and L. L. C. Williams, "GARNET: A graphical attack graph and reachability network evaluation tool," in Visualization for Computer Security, K. Prole, Ed. Heidelberg/Berlin, Germany: Springer, 2008, pp. 44-59.
    • (2008) Visualization for Computer Security , pp. 44-59
    • Lippmann, R.P.1    Williams, L.L.C.2
  • 26
    • 78149430881 scopus 로고    scopus 로고
    • Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR
    • M. Chu et al., "Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR," in Proc.7th Int. Symp. Visualization Cyber Security, 2010, pp. 22-33.
    • (2010) Proc.7th Int. Symp. Visualization Cyber Security , pp. 22-33
    • Chu, M.1
  • 27
    • 57049131581 scopus 로고    scopus 로고
    • Identifying critical attack assets in dependency attack graphs
    • R. Sawilla and X. Ou, "Identifying critical attack assets in dependency attack graphs," in Proc. 13th Eur. Symp. Res. Comput. Security, 2008, pp. 18-34.
    • (2008) Proc. 13th Eur. Symp. Res. Comput. Security , pp. 18-34
    • Sawilla, R.1    Ou, X.2
  • 28
    • 81855177321 scopus 로고    scopus 로고
    • A quantitative evaluation of vulnerability scanning
    • H. Holm et al., "A quantitative evaluation of vulnerability scanning," Inform. Manage. Comput. Security, vol. 19, no. 4, pp. 231-247, 2011.
    • (2011) Inform. Manage. Comput. Security , vol.19 , Issue.4 , pp. 231-247
    • Holm, H.1
  • 29
    • 84881143298 scopus 로고    scopus 로고
    • Guide to industrial control systems (ICS) security recommendations of the national institute of standards and technology
    • Gaithersburg MD
    • K. Stouffer, J. Falco, and K. Kent, "Guide to industrial control systems (ICS) security recommendations of the National Institute of Standards and Technology," NIST Special Publication 800-82, Gaithersburg, MD, 2008.
    • (2008) NIST Special Publication 800-82
    • Stouffer, K.1    Falco, J.2    Kent, K.3
  • 30
    • 77950793246 scopus 로고    scopus 로고
    • Modeling modern network attacks and countermeasures using attack graphs
    • K. Ingols et al., "Modeling modern network attacks and countermeasures using attack graphs," in Proc. Annu. Comput. Security Appl. Conf., 2009, pp. 117-126.
    • (2009) Proc. Annu. Comput. Security Appl. Conf , pp. 117-126
    • Ingols, K.1
  • 33
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • Apr
    • J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," ACM SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, p. 39, Apr. 2004.
    • (2004) ACM SIGCOMM Comput. Commun. Rev , vol.34 , Issue.2 , pp. 39
    • Mirkovic, J.1    Reiher, P.2
  • 35
    • 34247546866 scopus 로고    scopus 로고
    • A comparison of publicly available tools for dynamic buffer overflow prevention
    • J. Wilander and M. Kamkar, "A comparison of publicly available tools for dynamic buffer overflow prevention," in Proc. 10th Network Distributed Syst. Security Symp., 2003, pp. 149-162.
    • (2003) Proc. 10th Network Distributed Syst. Security Symp , pp. 149-162
    • Wilander, J.1    Kamkar, M.2
  • 36
    • 84946237235 scopus 로고    scopus 로고
    • Buffer overflows: Attacks and defenses for the vulnerability of the decade
    • C. Cowan et al., "Buffer overflows: Attacks and defenses for the vulnerability of the decade," in Foundations of Intrusion Tolerant Systems, 2003
    • (2003) Foundations of Intrusion Tolerant Systems
    • Cowan, C.1
  • 38
    • 84865210534 scopus 로고    scopus 로고
    • Countermeasures against buffer overflow attacks
    • N. Frykholm, "Countermeasures against buffer overflow attacks," RSA Tech. Note, 2000, pp. 1-9.
    • (2000) RSA Tech. Note , pp. 1-9
    • Frykholm, N.1
  • 41
    • 38849143105 scopus 로고    scopus 로고
    • Advances in password cracking
    • DOI 10.1007/s11416-007-0064-y, SSTIC 2007 Special Issue
    • S. Marechal, "Advances in password cracking," J. Comput. Virol., vol. 4, no. 1, pp. 73-81, 2007. (Pubitemid 351207809)
    • (2008) Journal in Computer Virology , vol.4 , Issue.1 , pp. 73-81
    • Marechal, S.1
  • 42
    • 77953306210 scopus 로고    scopus 로고
    • Password strength: An empirical analysis
    • M. Dell' Amico et al., "Password strength: An empirical analysis," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Dell'Amico, M.1
  • 43
    • 85001728633 scopus 로고    scopus 로고
    • Password security: An empirical investigation into e-commerce passwords and their crack times
    • Dec
    • J. A. Cazier and B. D. Medlin, "Password security: An empirical investigation into e-commerce passwords and their crack times," Inform. Syst. Security, vol. 15, no. 6, pp. 45-55, Dec. 2006.
    • (2006) Inform. Syst. Security , vol.15 , Issue.6 , pp. 45-55
    • Cazier, J.A.1    Medlin, B.D.2
  • 44
    • 84868377366 scopus 로고    scopus 로고
    • Mar. 3 [Online] Available
    • Free Rainbow Tables. (2012, Mar. 3) [Online]. Available: http://www. freerainbowtables.com/
    • (2012) Free Rainbow Tables
  • 45
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • Nov
    • J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," ACM Trans. Inf. Syst. Security, vol. 3, no. 4, pp. 262-294, Nov. 2000.
    • (2000) ACM Trans. Inf. Syst. Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 48
    • 84861873854 scopus 로고    scopus 로고
    • Estimates of success rates of remote arbitrary code execution attacks
    • T. Sommestad, H. Holm, and M. Ekstedt, "Estimates of success rates of remote arbitrary code execution attacks," Inform. Manage. Comput. Security, vol. 20, no. 2, pp. 107-122, 2012.
    • (2012) Inform. Manage. Comput. Security , vol.20 , Issue.2 , pp. 107-122
    • Sommestad, T.1    Holm, H.2    Ekstedt, M.3
  • 49
    • 84856180318 scopus 로고    scopus 로고
    • Estimates of success rates of denial-of-service attacks
    • T. Sommestad, H. Holm, and M. Ekstedt, "Estimates of success rates of denial-of-service attacks," in Proc. TrustCom, 2011, pp. 21-28.
    • (2011) Proc. TrustCom , pp. 21-28
    • Sommestad, T.1    Holm, H.2    Ekstedt, M.3
  • 51
    • 38149037931 scopus 로고    scopus 로고
    • TU Delft expert judgment data base
    • May
    • R. Cooke, "TU Delft expert judgment data base," Reliab. Eng. Syst. Safety, vol. 93, no. 5, pp. 657-674, May 2008.
    • (2008) Reliab. Eng. Syst. Safety , vol.93 , Issue.5 , pp. 657-674
    • Cooke, R.1
  • 52
    • 84880573803 scopus 로고    scopus 로고
    • Exploiting network configuration mistakes: Practitioners self-assessed success rate
    • 069, Stockholm, Sweden
    • T. Sommestad, "Exploiting network configuration mistakes: Practitioners self-assessed success rate," Royal Instit. Technol., Tech. Rep. TRITA-EE 2011:069, Stockholm, Sweden, 2011.
    • (2011) Royal Instit. Technol., Tech. Rep. TRITA-EE 2011
    • Sommestad, T.1
  • 53
    • 79959599477 scopus 로고    scopus 로고
    • Security mistakes in information system deployment projects
    • T. Sommestad et al., "Security mistakes in information system deployment projects," Inform. Manage. Comput. Security, vol. 19, no. 2, pp. 80-94, 2011.
    • (2011) Inform. Manage. Comput. Security , vol.19 , Issue.2 , pp. 80-94
    • Sommestad, T.1
  • 54
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • Jun
    • A. Wool, "A quantitative study of firewall configuration errors," Computer, vol. 37, no. 6, pp. 62-67, Jun. 2004.
    • (2004) Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1
  • 58
    • 33845523685 scopus 로고    scopus 로고
    • Using phishing for user email security awareness
    • DOI 10.1007/0-387-33406-8-41, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
    • R. Dodge and A. Ferguson, "Using phishing for user email security awareness," in Security and Privacy in Dynamic Environments, vol. 201, S. Fischer-Hübner, K. Rannenberg, L. Yngström, and S. Lindskog, Eds. Boston, MA: Springer, 2006, pp. 454-459. (Pubitemid 44920678)
    • (2006) IFIP International Federation for Information Processing , vol.201 , pp. 454-459
    • Dodge, R.C.1    Ferguson, A.J.2
  • 59
    • 84880573378 scopus 로고    scopus 로고
    • Mar. 21 [Online] Available
    • M. Buschle. (2012. Mar. 21). KTH The Enterprise Architecture Tool [Online]. Available: http://www.kth.se/ees/omskolan/organisation/avdelningar/ ics/research/eat
    • (2012) KTH the Enterprise Architecture Tool
    • Buschle, M.1
  • 60
    • 0027539718 scopus 로고
    • Expert system verification and validation: A survey and tutorial
    • Feb
    • R. M. O'Keefe and D. E. O'Leary, "Expert system verification and validation: A survey and tutorial," Artif. Intell. Rev., vol. 7, no. 1, pp. 3-42, Feb. 1993.
    • (1993) Artif. Intell. Rev , vol.7 , Issue.1 , pp. 3-42
    • O'Keefe, R.M.1    O'Leary, D.E.2
  • 61
    • 79551528427 scopus 로고    scopus 로고
    • A tool for enterprise architecture analysis using the PRM Formalism
    • P. Soffer and E. Proper, Eds. Berlin/Heidelberg, Germany Springer
    • M. Buschle, J. Ullberg, U. Franke, R. Lagerström, and T. Sommestad, "A tool for enterprise architecture analysis using the PRM Formalism," in Information Systems Evolution, vol. 72, P. Soffer and E. Proper, Eds. Berlin/Heidelberg, Germany: Springer, 2011, pp. 108-121.
    • (2011) Information Systems Evolution , vol.72 , pp. 108-121
    • Buschle, M.1    Ullberg, J.2    Franke, U.3    Lagerström, R.4    Sommestad, T.5
  • 62
  • 63
    • 0027577726 scopus 로고
    • Formal validation of a knowledge-based system using a variation of the turning test
    • DOI 10.1016/0957-4174(93)90008-T
    • R. Agarwal, R. Kannan, and M. Tanniru, "Formal validation of a knowledge-based system using a variation of the Turing test," Expert Syst. Appl., vol. 6, no. 2, pp. 181-192, Apr. 1993. (Pubitemid 23680020)
    • (1993) Expert Systems with Applications , vol.6 , Issue.2 , pp. 181-192
    • Agarwal Ritu1    Kannan Ramu2    Tanniru Mohan3
  • 66
    • 34250003707 scopus 로고    scopus 로고
    • The contemporary software security landscape
    • DOI 10.1109/MSP.2007.73
    • D. Ahmad, "The contemporary software security landscape," IEEE Security Privacy Mag., vol. 5, no. 3, pp. 75-77, May 2007. (Pubitemid 46883440)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 75-77
    • Ahmad, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.