The Attack Navigator (Invited)

Christian W. Probst, Jan Willemson, Wolter Pieters

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    7 Citations (Scopus)


    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and develop-ment speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks that are caused by the strategic behaviour of adversaries. There-fore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio-technical system, the attack navigator identi﬿es routes to an attacker goal. Speci﬿c attacker properties such as skill or resources can be included through attacker pro﬿les. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions.
    Original languageEnglish
    Title of host publicationGraphical Models for Security
    Subtitle of host publicationSecond International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
    EditorsSjouke Mauw, Barbara Kordy, Sushil Jajodia
    Place of PublicationCham
    Number of pages17
    ISBN (Electronic)978-3-319-29968-6
    ISBN (Print)978-3-319-29967-9
    Publication statusPublished - 6 Feb 2016
    Event2nd International Workshop on Graphical Models for Security, GraMSec 2015 - Verona, Italy
    Duration: 13 Jul 201513 Jul 2015
    Conference number: 2

    Publication series

    NameLecture Notes in Computer Science
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349


    Workshop2nd International Workshop on Graphical Models for Security, GraMSec 2015
    Abbreviated titleGraMSec


    • METIS-316832
    • IR-100407
    • EC Grant Agreement nr.: FP7/2007-2013
    • EC Grant Agreement nr.: FP7/318003
    • Attack Navigator
    • EWI-26713


    Dive into the research topics of 'The Attack Navigator (Invited)'. Together they form a unique fingerprint.

    Cite this