构建面向信息安全风险分析的攻击树

U.V. Kuzmina, O. Kazakov, Bogdan Erushev
{"title":"构建面向信息安全风险分析的攻击树","authors":"U.V. Kuzmina, O. Kazakov, Bogdan Erushev","doi":"10.1109/SmartIndustryCon57312.2023.10110738","DOIUrl":null,"url":null,"abstract":"With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Building an Attack Tree for Analysis of Information Security Risks\",\"authors\":\"U.V. Kuzmina, O. Kazakov, Bogdan Erushev\",\"doi\":\"10.1109/SmartIndustryCon57312.2023.10110738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.\",\"PeriodicalId\":157877,\"journal\":{\"name\":\"2023 International Russian Smart Industry Conference (SmartIndustryCon)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Russian Smart Industry Conference (SmartIndustryCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在经过深思熟虑的信息安全威胁模型的帮助下,您可以开发基于当前威胁的保护计划。创建用于评估企业资产保护状态的最有效系统的任务是建模的主要目标之一。它们暗示了信息安全概念的普遍性。您应该使用此过程的各种方法,并具有必要的视角和足够的详细程度来描述威胁模型。使用所有可能的威胁实现的方法以树或攻击图(GAT)的形式构建,并验证其属性。威胁、连接及其参数的集合由资产所有者和信息安全专家确定。由于使用了这样的数据集和所描述的结构,消除了具有完全重叠的安全模型中的缺点成为可能。在本文中,我们描述了一个软件应用程序的创建,用于自动化和形式化评估信息系统资产的信息安全性和信息系统安全瓶颈的本地化的过程。该应用程序的一个显著特点是使用俄罗斯FSTEC的威胁数据库来模拟攻击树。FSTEC是俄罗斯信息安全领域的国家监管机构。开发的软件应用程序简化了信息系统安全评估过程,节省了时间,并使威胁建模过程可视化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Building an Attack Tree for Analysis of Information Security Risks
With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Approach to Efficient Task Allocation and Cost Minimization in Collaborative Robotic Systems Modification of the Risk Potential Predicting Algorithm for Monitoring the State of the NPP Power Unit Identification of a Depressive State Among Users of the Vkontakte Social Network An Approach to Improving the Efficiency of the Database of a Large Industrial Enterprise Development of an Integrated Expert System for Distribution Network Diagnostics Based on Artificial Intelligence Technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1