SwePub
Sök i LIBRIS databas

  Extended search

WFRF:(Ekstedt Mathias 1975 )
 

Search: WFRF:(Ekstedt Mathias 1975 ) > Empirical evaluatio...

Empirical evaluation of a threat modeling language as a cybersecurity assessment tool

Katsikeas, Sotirios, PhD Student (author)
KTH,Nätverk och systemteknik
Rencelj Ling, Engla, 1990- (author)
KTH,Nätverk och systemteknik
Johnsson, Pontus (author)
KTH,Nätverk och systemteknik
show more...
Ekstedt, Mathias, 1975- (author)
KTH,Nätverk och systemteknik
show less...
 (creator_code:org_t)
Elsevier BV, 2024
2024
English.
In: Computers & security (Print). - : Elsevier BV. - 0167-4048 .- 1872-6208. ; 140
  • Journal article (peer-reviewed)
Abstract Subject headings
Close  
  • The complexity of ICT infrastructures is continuously increasing, presenting a formidable challenge in safeguarding them against cyber attacks. In light of escalating cyber threats and limited availability of expert resources, organizations must explore more efficient approaches to assess their resilience and undertake proactive measures. Threat modeling is an effective approach for assessing the cyber resilience of ICT systems. One method is to utilize Attack Graphs, which visually represent the steps taken by adversaries during an attack. Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework for developing Domain-Specific Languages (DSLs) and generating Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes such Attack Graphs to enable attack simulations and security assessments for the generic ICT domain. Developing domain-specific languages for threat modeling and attack simulations provides a powerful approach for conducting security assessments of infrastructures. However, ensuring the correctness of these modeling languages raises a separate research question. In this study we conduct an empirical experiment aiming to falsify such a domain-specific threat modeling language. The potential inability to falsify the language through our empirical testing would lead to its corroboration, strengthening our belief in its validity within the parameters of our study. The outcomes of this approach indicated that, on average, the assessments generated by attack simulations outperformed those of human experts. Additionally, both human experts and simulations exhibited significantly superior performance compared to random guessers in their assessments. While specific human experts occasionally achieved better assessments for particular questions in the experiments, the efficiency of simulation-generated assessments surpasses that of human domain experts.

Subject headings

NATURVETENSKAP  -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Computer Sciences (hsv//eng)
TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Datorsystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Computer Systems (hsv//eng)

Keyword

Cyber attack simulations
Cyber security
Domain experts
Domain-specific threat modeling language
Empirical language evaluation

Publication and Content Type

ref (subject category)
art (subject category)

Find in a library

To the university's database

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view