Combining Defense Graphs and Enterprise Architecture Models for Security Analysis

  • Authors:
  • Teodor Sommestad;Mathias Ekstedt;Pontus Johnson

  • Affiliations:
  • -;-;-

  • Venue:
  • EDOC '08 Proceedings of the 2008 12th International IEEE Enterprise Distributed Object Computing Conference
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security is dependent on a mixture of interrelated concepts such as technical countermeasures, organizational policies, security procedures, and more. To facilitate rational decision making, these concepts need to be combined into an overall judgment on the current security posture, as well as potential future ones. Decision makers are, however, faced with uncertainty regarding both what countermeasures that is in place, and how well different countermeasures contribute to mitigating attacks. This paper presents a security assessment framework using the Bayesian statistics-based Extended Influence Diagrams to combine attack graphs with countermeasures into defense graphs. The approach makes it possible to calculate the probability that attacks succeed based on an enterprise architecture model. The framework also takes uncertainties of the security assessment into consideration. Moreover, using the extended influence diagram formalism the expected loss from each attack can be calculated.