Evolving Secure Information Systems through Attack Simulation. Kiesling, E., Ekelhart, A., Grill, B., Stummer, C., & Strauss, C. In 47th Hawaii International Conference on System Sciences (HICSS 2014), pages 4868–4877, 1, 2014.
doi  abstract   bibtex   
In this paper, we introduce a simulation-based, evolutionary approach for analyzing and improving the security of complex information systems. Rather than following a purely technical approach, we bring in a social and behavioral perspective through a combination of conceptual security knowledge modeling, behavioral modeling of threat agents, simulation of attacks, and evolutionary optimization. Based on results from numerous attack simulations for various internal and external attackers, metrics such as impact on confidentiality, availability, and integrity of the simulated attacks are monitored and efficient sets of security controls with respect to multiple risk, cost and benefit objectives are determined. We describe the developed approach as well as a prototypical implementation and demonstrate its applicability by means of an illustrative example.
@InProceedings{Kiesling2014,
  author =    {Kiesling, E. and Ekelhart, A. and Grill, B. and Stummer, C. and Strauss, C.},
  title =     {Evolving Secure Information Systems through Attack Simulation},
  booktitle = {47th Hawaii International Conference on System Sciences (HICSS 2014)},
  year =      {2014},
  pages =     {4868--4877},
  month =     {1},
  abstract =  {In this paper, we introduce a simulation-based, evolutionary approach for analyzing and improving the security of complex information systems. Rather than following a purely technical approach, we bring in a social and behavioral perspective through a combination of conceptual security knowledge modeling, behavioral modeling of threat agents, simulation of attacks, and evolutionary optimization. Based on results from numerous attack simulations for various internal and external attackers, metrics such as impact on confidentiality, availability, and integrity of the simulated attacks are monitored and efficient sets of security controls with respect to multiple risk, cost and benefit objectives are determined. We describe the developed approach as well as a prototypical implementation and demonstrate its applicability by means of an illustrative example.},
  doi =       {10.1109/HICSS.2014.597},
  file =      {:EvolvingSecureInformationSystems.pdf:PDF},
  keywords =  {evolutionary computation;security of data;attack simulation;behavioral perspective;complex information system security;conceptual security knowledge modeling;evolutionary optimization;multiple risk;secure information system;social perspective;threat agent;Abstracts;Availability;Context;Educational institutions;Information systems;Optimization;Security}
}

Downloads: 0