2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing 2014
DOI: 10.1109/pdp.2014.105
|View full text |Cite
|
Sign up to set email alerts
|

A Scenario Method to Automatically Assess ICT Risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…This work integrates the results outlined in [1,2] and presents them systematically. Furthermore, it applies the suite tools to assess and manage the ICT risk of two ICSs, each supervising a distinct power generation plant.…”
Section: Introductionmentioning
confidence: 81%
“…This work integrates the results outlined in [1,2] and presents them systematically. Furthermore, it applies the suite tools to assess and manage the ICT risk of two ICSs, each supervising a distinct power generation plant.…”
Section: Introductionmentioning
confidence: 81%
“…This section describes the tools of the Haruspex suite [1] that simulate the attacker behaviors to produce synthetic attack sequences. In the following, we denote by user the team that interacts with such tools to assess and manage the security risks of an ICT system.…”
Section: Ict Risk Assessment: the Haruspex Approachmentioning
confidence: 99%
“…We exploit knowledge discovery approaches to extract informative patterns from the data in the form of sequential patterns. The intended objective is twofold: (1) to exploit the extracted patterns for the design of attack countermeasures, and (2) for gaining a better understanding of the "degree of freedom" available for the attackers of a system. Objective (1) can be achieved by using data mining models for making predictions on the next attack of a threat agent that is following a matched pattern [4,9,11], hence enforcing dynamic counter-measures.…”
Section: Introductionmentioning
confidence: 99%
“…Haruspex is a suite of tools that supports the proposed approach. Some tools of the suite build the infrastructure, and the agent models starting from the output of a vulnerability scanning and by interacting with the user.…”
Section: Introductionmentioning
confidence: 99%
“…With respect to our previous works , this one is focused on risk management rather than on risk assessment. Hence, we briefly describe the tools to assess the risk and focus on the planner and the manager that automatically manage the risk.…”
Section: Introductionmentioning
confidence: 99%