2009
DOI: 10.1016/j.infsof.2008.05.013
|View full text |Cite
|
Sign up to set email alerts
|

Experimental comparison of attack trees and misuse cases for security threat identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
75
0
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(77 citation statements)
references
References 29 publications
1
75
0
1
Order By: Relevance
“…Fault trees were originally developed to identify the effects of component failures on a system [16] while attack trees traditionally focused on the effects of cyber security breaches [14]. There have been recent variants of these trees, and sometimes these trees have been used interchangeably [2,5,6,7,11]. However, these trees all have one thing in common: they are binaryvalued trees, connected with AND and OR operators.…”
Section: Introductionmentioning
confidence: 99%
“…Fault trees were originally developed to identify the effects of component failures on a system [16] while attack trees traditionally focused on the effects of cyber security breaches [14]. There have been recent variants of these trees, and sometimes these trees have been used interchangeably [2,5,6,7,11]. However, these trees all have one thing in common: they are binaryvalued trees, connected with AND and OR operators.…”
Section: Introductionmentioning
confidence: 99%
“…Opdahl and Sindre [21] compared misuse cases with attack trees in a controlled experiment with students and repeated it with industrial practitioners in [22]. Both studies showed that attack trees help to identify more threats than misuse cases, but both methods have similar perception.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Second, as all participants were provided with a catalogues, they could easily produce a large number of threats and control, irrespective of the method used. Further, [21] have also reported that different methods might help to generate outcomes of difference quality: participants using attack trees identified mainly generic threats, while misuse cases helped to identify more domain-specific threats.…”
Section: Peou Pumentioning
confidence: 99%
See 2 more Smart Citations