The attack navigator

Christian W. Probst*, Jan Willemson, Wolter Pieters

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

8 Citations (Scopus)
77 Downloads (Pure)

Abstract

The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio-technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions.

Original languageEnglish
Pages (from-to)1-17
Number of pages17
JournalLecture Notes in Computer Science
Volume9390
DOIs
Publication statusPublished - 2016

Fingerprint

Dive into the research topics of 'The attack navigator'. Together they form a unique fingerprint.

Cite this