作者
Igor Kotenko, Mikhail Stepashkin, Elena Doynikova
发表日期
2011/2/9
研讨会论文
2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing
页码范围
611-618
出版商
IEEE
简介
The paper suggests an attack trees based approach to security analysis of information systems. The approach considers both software-technical and social engineering attacks. It extends the approach to network security analysis based on software-technical attacks which was suggested earlier by the authors of this paper. The main difference is in generalizing the suggested approach for information systems and in use of different conceptions, models and frameworks related to social-engineering attacks. In particular, we define conceptions of legitimate users and control areas. Besides, social-engineering attacks and attacks that require physical access to control areas are included to the attack trees used for security analysis. The paper also describes a security analysis toolkit based on the approach suggested and experiments with it to define the security level of information system.
引用总数
2011201220132014201520162017201820192020202120222023202431196510148102822
学术搜索中的文章
I Kotenko, M Stepashkin, E Doynikova - 2011 19th International Euromicro Conference on …, 2011