2019
DOI: 10.1007/s11416-019-00342-x
|View full text |Cite
|
Sign up to set email alerts
|

PenQuest: a gamified attacker/defender meta model for cyber security assessment and education

Abstract: Attacks on IT systems are a rising threat against the confidentiality, integrity, and availability of critical information and infrastructures. At the same time, the complex interplay of attack techniques and possible countermeasures makes it difficult to appropriately plan, implement, and evaluate an organization's defense. More often than not, the worlds of technical threats and organizational controls remain disjunct. In this article, we introduce PenQuest, a meta model designed to present a complete view o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 30 publications
0
22
0
Order By: Relevance
“…For attack modeling and the subsequent interpretation of classified system 375 behavior, we utilize PenQuest [43,44], our versatile attacker-defender meta model that takes the definition of threat stages and provides concrete actions based on accepted security languages and standards. See Figure 2 for an overview of the model.…”
Section: Attack Modelingmentioning
confidence: 99%
See 4 more Smart Citations
“…For attack modeling and the subsequent interpretation of classified system 375 behavior, we utilize PenQuest [43,44], our versatile attacker-defender meta model that takes the definition of threat stages and provides concrete actions based on accepted security languages and standards. See Figure 2 for an overview of the model.…”
Section: Attack Modelingmentioning
confidence: 99%
“…Specifically, PenQuest allows for simulating time-enabled attacker/defender 380 behavior as part of a dynamic, imperfect information multi-player game that derives significant parts of its ruleset from established information security sources such as STIX [4], CAPEC 1 , CVE 2 /CWE 3 , and the NIST SP800-53 security & privacy controls standard [27]. Attack patterns, vulnerabilities, and mitigating controls are mapped to counterpart strategies and concrete actions through [43,44]. The lower left side depicts the AIDIS data provider (agent) monitoring for anomalies or pattern occurrence, while the right sight shows PenQuest's class structure for a generalized Action X (see definition below).…”
Section: Attack Modelingmentioning
confidence: 99%
See 3 more Smart Citations