In this paper we present a qualitative approach for the selec- tion of security countermeasures able to protect an IT system from attacks. For this purpose, we model security sce- narios by using defense trees (an extension of attack trees) and preferences over countermeasure using Conditional Pref- erence networks (CP-nets for short). In particular, we in- troduce two different methods for the composition of pref- erences: the and-composition and the or-composition. The first one is used to determine a preference order in the selec- tion of countermeasures able to mitigate the risks produced by conjunct attacks. The second one is used to determine a preference order over sets of countermeasures able to miti- gate the risks produced by alternative attacks.

Using CP-nets as a guide for countermeasure selection

Bistarelli S;
2007

Abstract

In this paper we present a qualitative approach for the selec- tion of security countermeasures able to protect an IT system from attacks. For this purpose, we model security sce- narios by using defense trees (an extension of attack trees) and preferences over countermeasure using Conditional Pref- erence networks (CP-nets for short). In particular, we in- troduce two different methods for the composition of pref- erences: the and-composition and the or-composition. The first one is used to determine a preference order in the selec- tion of countermeasures able to mitigate the risks produced by conjunct attacks. The second one is used to determine a preference order over sets of countermeasures able to miti- gate the risks produced by alternative attacks.
2007
Istituto di informatica e telematica - IIT
22nd ACM Symposium on Applied Computing (SAC '07)
300
304
5
978-1-59593-480-2
ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA
BROADWAY
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
11-15 March 2007
Seoul, South Korea
IT system
Conditional Preference networks
1
none
Bistarelli S.; Fioravanti F.; Peretti P.
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/75871
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 34
  • ???jsp.display-item.citation.isi??? 19
social impact