[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Paul Tavolato 1 ; Robert Luh 2 ; 1 and Sebastian Eresheim 2 ; 1

Affiliations: 1 Research Group Security and Privacy, University of Vienna, Kolingasse 14-16, A-1090 Vienna, Austria ; 2 Department of Computer Science, UAS St. Pölten, A-3100 St. Pölten, Austria

Keyword(s): Threat Analysis, Formal Methods, Stochastic Game Theory, Model Checking.

Abstract: Using formal methods in threat analysis would be of great benefit to securing modern IT systems. To this end a strictly formal description of attacker-defender scenarios is vital. This paper demonstrates how attacker and defender behavior and its interrelationship can be defined using Markov decision processes and stochastic game theory. Based on these definitions, model checking methods can be applied to find quantitative answers to important questions relevant in threat analysis. A main focus lies on the applicability of the method to real-world situations. This is accomplished by incorporating information from several proven tactical and technical knowledge bases. Practicability of the method is shown by using the model checking tool PRISM-games.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 79.170.44.78

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Tavolato, P. ; Luh, R. and Eresheim, S. (2022). Formalizing Real-world Threat Scenarios. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-553-1; ISSN 2184-4356, SciTePress, pages 281-289. DOI: 10.5220/0010781300003120

@conference{icissp22,
author={Paul Tavolato and Robert Luh and Sebastian Eresheim},
title={Formalizing Real-world Threat Scenarios},
booktitle={Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP},
year={2022},
pages={281-289},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010781300003120},
isbn={978-989-758-553-1},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP
TI - Formalizing Real-world Threat Scenarios
SN - 978-989-758-553-1
IS - 2184-4356
AU - Tavolato, P.
AU - Luh, R.
AU - Eresheim, S.
PY - 2022
SP - 281
EP - 289
DO - 10.5220/0010781300003120
PB - SciTePress

<style> #socialicons>a span { top: 0px; left: -100%; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease-in-out; -o-transition: all 0.3s ease-in-out; -ms-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;} #socialicons>ahover div{left: 0px;} </style>