Abstract
This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and Bayesian networks are two well-known approaches to security modeling. However there exist more than 30 DAG-based methodologies, each having different features and goals.
The objective of this survey is to summarize the existing methodologies, compare their features, and propose a taxonomy of the described formalisms. This article also supports the selection of an adequate modeling technique depending on user requirements.
Original language | English |
---|---|
Pages (from-to) | 1-38 |
Number of pages | 38 |
Journal | Computer science review |
Volume | 13-14 |
DOIs | |
Publication status | Published - Nov 2015 |
Externally published | Yes |
Keywords
- EC Grant Agreement nr.: FP7/318003
- EC Grant Agreement nr.: FP7/2007-2013
- Graphical models for security
- Quantitative and qualitative security assessment
- Security measures
- Attack trees
- Attack and defense modeling
- Bayesian Networks