2011 Eighth International Conference on Quantitative Evaluation of SysTems 2011
DOI: 10.1109/qest.2011.34
|View full text |Cite
|
Sign up to set email alerts
|

Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
90
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 134 publications
(92 citation statements)
references
References 9 publications
1
90
0
1
Order By: Relevance
“…[28,23] propose models to assess system security against classes of adversaries characterized by user-specified 'profiles'. While these models share some similarities with ours -in particular, they too employ mdp's to keep track of possible adversary strategies -their intent is quite different from ours: they are used to build and assess analysis tools, rather than to obtain analytical results.…”
Section: Boreale and F Pampalonimentioning
confidence: 99%
“…[28,23] propose models to assess system security against classes of adversaries characterized by user-specified 'profiles'. While these models share some similarities with ours -in particular, they too employ mdp's to keep track of possible adversary strategies -their intent is quite different from ours: they are used to build and assess analysis tools, rather than to obtain analytical results.…”
Section: Boreale and F Pampalonimentioning
confidence: 99%
“…Similarly, Sarraute et al [7] generate attack scenarios by taking into account lack of knowledge an adversary has about the network topology. LeMay et al [8] represent explicitly how an adversary is likely to attack the system depending on her preferences, actions cost, payoff and probability of detection. However, automated attack planning research has not addressed the problem of effective evidence collection in the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, exploits a vulnerability of to mask her username and escalate her privileges (steps 4-5). Once has escalated her privileges, she can gain command line access and copy the credentials of another user, e.g., (steps [7][8]. This is due to the fact that anytime a user accesses the database, her credentials are written in the MongoDB log file (steps 6).…”
Section: Overhead Of Evidence Collection Activitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…MulVAL (Ou et al 2006;Huang et al 2011), NetSPA (Ingols et al 2009), or the TVA-tool (Jajodia et al 2005)). Some tools also require extensive expertise for manual configuration, such as the cyber-physical cyber security analysis tools ADVISE (LeMay et al 2011) and CyberSAGE (Vu et al 2014). The authors of this paper use an advanced threat modelling and attack simulation tool that has been designed to overcome the mentioned problems and is based on numerous research studies Holm et al 2015).…”
Section: Introductionmentioning
confidence: 99%