Nuggets tagged model - [remove filter]

Jan. 6, 2016 (1 year, 7 months ago)

P2CySeMoL: Predictive, Probabilistic Cyber Security Modelling Language

This paper presents an attack graph tool that can be used to estimate the cyber security of enterprise architectures. The principal current approach for this purpose uses attack graphs; applying formal reasoning and graphical modelling to present possible attack paths corresponding to a certain architecture. According to a recent survey there are more than 30 different types of attack graph approaches but there are still many important aspects that current approaches do not manage. P2CySeMoL includes theory on how attacks and defences relate quantitatively; users model their assets and how these are connected in order to enable calculations. It has been validated on both a component level and a system level using literature, domain experts, surveys, observations, experiments and case studies.

March 13, 2014 (3 years, 5 months ago)

A model for identity in the cyber and natural universes

The manifestation of identity in both the cyber and 'real' world, occurs in many ways. An individual may have different pseudonymities, different usernames, accounts and in the real world, addresses, and even names for example. Piecng together these diverse data points to infer a common identity underlying this multiplicity of manifestations is a difficult problem for security analysts. This paper proposes a model of identity which can provide the context for such inferences. Confidence in the varoius componenets can be proppagated through the system to provide an overall metric of the super identity.