Incorporating attacker capabilities in risk estimation and mitigation
نویسندگان
چکیده
The risk exposure of a given threat to an information system is a function of the likelihood of the threat and the severity of its impacts. Existing methods for estimating threat likelihood assume that the attacker is able to cause a given threat, that exploits existing vulnerabilities, if s/he has the required opportunities (e.g., sufficient attack time) and means (e.g., tools and skills), which is not true; often, s/he can perform an attack and cause the related threat only if s/he has the ability to access related resources (objects) of the system that allow to do so. This paper proposes a risk estimation method that incorporates attacker capabilities in estimating the likelihood of threats as conditions for using the means and opportunities, demonstrates the use of the proposed risk estimation method through two examples: video conferencing systems and connected vehicles, shows that changing attacker capabilities changes the risks of the threats, and compares the uncertainty of experts in evaluating the likelihood of threats considering and not considering attacker capabilities for two experiments. The results of the experiments suggest that experts are less uncertain about their estimations of threat likelihoods when they consider attacker capabilities. © 2015 Elsevier Ltd. All rights reserved.
منابع مشابه
Using Attacker Capabilities and Motivations in Estimating Security Risk
Risk of a given threat is a function of the likelihood of exercising the threat and the severity of its impacts. This paper proposes incorporating attacker capabilities and motivations in estimating the likelihood of exercising threats. Attacker capability is the ability to use appropriate means (e.g., knowledge, time, expertise, and tools) and opportunity (e.g., enough time to perform the atta...
متن کاملEstimating post- and pre-mitigation contingency in construction
Contingency is necessary to mitigate and control risk associated with construction projects. Successful contingency estimation and risk mitigation strategies can help project managers to effectively control cost and schedule. Some practitioners mitigate risk by transferring it to another party with less effort and minimum cost. However, this may lead to undesirable results such as; useless depl...
متن کاملAnalysis of Information Security Problem by Probabilistic Risk Assessment
The information security risk assessment is investigated from perspectives of most advanced probabilistic risk assessment (PRA) for nuclear power plants. Accident scenario enumeration by initiating events, mitigation systems and event trees are first described and demonstrated. Assets, confidentiality, integrity, availability, threats, vulnerabilities, impacts, likelihoods, and safeguards are r...
متن کاملOptimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker (-Defender) Optimization To Terror Risk Assessment and Mitigation
The U.S. Department of Homeland Security (DHS) is investing billions of dollars to protect us from terrorist attacks and their expected damage (i.e., risk). We present prescriptive optimization models to guide these investments. Our primary goal is to recommend investments in a set of available defense options; each of these options can reduce our vulnerability to terrorist attack, or enable fu...
متن کاملAttacker Profiling in Quantitative Security Assessment Based on Attack Trees
Providing meaningful estimations for the quantitative annotations on the steps of complex multi-step attacks is hard, as they are jointly influenced by the infrastructure and attacker properties. The paper introduces attacker profiling as a concept of separation of the infrastructure properties from the properties of malicious agents undertaking strategic decisions in the considered environment...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 51 شماره
صفحات -
تاریخ انتشار 2015