loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Per Fahlander 1 ; Mathias Ekstedt 1 ; Preetam Mukherjee 1 ; 2 and Ashish Kumar Dwivedi 1

Affiliations: 1 Department of Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden ; 2 School of Computer Science and Engineering, Digital University Kerala, Kerala, India

Keyword(s): Threat Analysis, MAL, Containment Strategies, Simulated Annealing.

Abstract: Foreseeing, mitigating and preventing cyber-attacks is more important than ever before. Advances in the field of probabilistic threat modelling can help organisations understand their own resilience profile against cyber-attacks. Previous research has proposed MAL, a meta language for capturing the attack logic of a considered domain and running attack simulations in a model that depicts the defended IT-infrastructure. While this modality is already somewhat established for proposing general threat mitigation actions, less is known about how to model containment strategies in the event that penetration already has occurred. The problem is a fundamental gap between predominant threat models in cyber-security research and containment in the incident response lifecycle. This paper presents a solution to the problem by summarizing a methodology for reasoning about containment strategies in MAL-based threat models.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.137.180.32

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Fahlander, P.; Ekstedt, M.; Mukherjee, P. and Dwivedi, A. (2022). Containment Strategy Formalism in a Probabilistic Threat Modelling Framework. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-553-1; ISSN 2184-4356, SciTePress, pages 108-120. DOI: 10.5220/0010823800003120

@conference{icissp22,
author={Per Fahlander. and Mathias Ekstedt. and Preetam Mukherjee. and Ashish Kumar Dwivedi.},
title={Containment Strategy Formalism in a Probabilistic Threat Modelling Framework},
booktitle={Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP},
year={2022},
pages={108-120},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010823800003120},
isbn={978-989-758-553-1},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP
TI - Containment Strategy Formalism in a Probabilistic Threat Modelling Framework
SN - 978-989-758-553-1
IS - 2184-4356
AU - Fahlander, P.
AU - Ekstedt, M.
AU - Mukherjee, P.
AU - Dwivedi, A.
PY - 2022
SP - 108
EP - 120
DO - 10.5220/0010823800003120
PB - SciTePress