Portunes: representing attack scenarios spanning through the physical, digital and social domain

T. Dimkov, Wolter Pieters, Pieter H. Hartel

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    27 Citations (Scopus)
    116 Downloads (Pure)

    Abstract

    The security goals of an organization are realized through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals by combining physical, digital and social means. A systematic analysis of such attacks requires the whole environment where the insider operates to be formally represented. This paper presents Portunes, a framework which integrates all three security domains in a single environment. Portunes consists of a high-level abstraction model focusing on the relations between the three security domains and a lower abstraction level language able to represent the model and describe attacks which span the three security domains. Using the Portunes framework, we are able to represent a whole new family of attacks where the insider is not assumed to use purely digital actions to achieve a malicious goal.
    Original languageUndefined
    Title of host publicationProceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers
    Place of PublicationBerlin
    PublisherSpringer
    Pages112-129
    Number of pages18
    ISBN (Print)978-3-642-16074-5
    DOIs
    Publication statusPublished - Mar 2010
    EventJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers - Paphos, Cyprus
    Duration: 27 Mar 201028 Mar 2010

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer Verlag
    Number6186
    Volume6186

    Workshop

    WorkshopJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers
    Period27/03/1028/03/10
    Other27-28 March 2010

    Keywords

    • IR-72615
    • METIS-276703
    • physical security
    • EWI-17295
    • Insider Threat
    • SCS-Cybersecurity
    • security awareness
    • security model

    Cite this