2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2013
DOI: 10.1109/dsn.2013.6575362
|View full text |Cite
|
Sign up to set email alerts
|

Implementing the ADVISE security modeling formalism in Möbius

Abstract: The ADversary VIew Security Evaluation (ADVISE) model formalism provides a system security model from the perspective of an adversary. An ADVISE atomic model consists of an attack execution graph (AEG) composed of attack steps, system state variables, and attack goals, as well as an adversary profile that defines the abilities and interests of a particular adversary. The ADVISE formalism has been implemented as a Möbius atomic model formalism in order to leverage the existing set of mature modeling formalisms … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…The calculated metrics are time to compromise, the probability of taking a certain path, and the probability of being in a certain attack step. Ford et al [260] present a tool that implements this approach (called ADVISE) in the Möbius Eclipse tool.…”
Section: Attack Modellingmentioning
confidence: 99%
“…The calculated metrics are time to compromise, the probability of taking a certain path, and the probability of being in a certain attack step. Ford et al [260] present a tool that implements this approach (called ADVISE) in the Möbius Eclipse tool.…”
Section: Attack Modellingmentioning
confidence: 99%
“…In [6] we extended the PIA method by adding an Adversary model and building on the recent work by others in this direction, e.g. the ADVISE formalism [4]. The focus of this paper is to study the impact on network service of different attack strategies -where such strategies might be employed by naïve or more sophisticated attackers -and to highlight the effectiveness of some precautionary measures that a network operator could undertake.…”
Section: Problem Statementmentioning
confidence: 99%
“…We propose to extend the PIA method by adding an Adversary model and building on the recent work by others in this direction, e.g. the ADVISE formalism [4].…”
Section: Problem Statementmentioning
confidence: 99%