Proceedings of the 2007 ACM Symposium on Applied Computing 2007
DOI: 10.1145/1244002.1244073
|View full text |Cite
|
Sign up to set email alerts
|

Using CP-nets as a guide for countermeasure selection

Abstract: In this paper we present a qualitative approach for the selection of security countermeasures able to protect an IT system from attacks. For this purpose, we model security scenarios by using defense trees (an extension of attack trees) and preferences over countermeasure using Conditional Preference networks (CP-nets for short). In particular, we introduce two different methods for the composition of preferences: the and-composition and the or-composition. The first one is used to determine a preference order… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…The combination of defence trees and CP-nets has been recently proposed [4] as a methodology to help the system administrator to analyze a security scenario and to give him a model to represent preferences among countermeasure. The resulting structure, called CP-defence tree, integrating the CP-net described in Figure 2 is presented in Figure 2(c).…”
Section: Cp-defence Treesmentioning
confidence: 99%
See 4 more Smart Citations
“…The combination of defence trees and CP-nets has been recently proposed [4] as a methodology to help the system administrator to analyze a security scenario and to give him a model to represent preferences among countermeasure. The resulting structure, called CP-defence tree, integrating the CP-net described in Figure 2 is presented in Figure 2(c).…”
Section: Cp-defence Treesmentioning
confidence: 99%
“…In order to find the preferred defence strategy, the approach, consisting in the composition of preferences, was proposed in [4]. More in details, two different methods establishing the preference order among the countermeasures able to stop an and-attack and an or-attack were presented.…”
Section: And /Or Composition Of Attacksmentioning
confidence: 99%
See 3 more Smart Citations