Abstract
Threat analysis identifies how potential adversaries exploit system weaknesses to achieve their goals. Attack graphs are one method to conduct threat analysis by exposing vulnerability relationships, allowing administrators to pinpoint high risk paths. However, computational and cognitive complexity challenges must be dealt with. One method for managing threat analysis and attack graph complexity is to differentiate between likely and unlikely attack paths using threat source models. Threat source models are used during risk assessments to describe likely and unlikely adversary behavior, and so can be used for the same purpose during attack graph analysis. The framework presented here allows threat source models to guide attack graph generation to remove unlikely attack paths.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.