Skip to main navigation Skip to search Skip to main content

A visualisation technique for the identification of security threats in networked systems

  • Carsten Maple
  • , Valentina Viduto

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

This paper is primarily focused on the increased IT complexity problem and the identification of security threats in networked systems. Modern networking systems, applications and services are found to be more complex in terms of integration and distribution, therefore, harder to be managed and protected. CIOs have to put their effort on threat's identification, risk management and security evaluation processes. Objective decision making requires measuring, identifying and evaluating all enterprise events, either positive (opportunities) or negative (risks) and keeping them in perspective with the business objectives. Our approach is based on a visualisation technique that helps in decision making process, focusing on the threat identification using attack scenarios. For constructing attack scenarios we use the notion of attack graphs, as well as layered security approach. The proposed onion skin model combines attack graphs and security layers to illustrate possible threats and shortest paths to the attacker's goal. By providing few examples we justify the advantage of the threat identification technique in decision making process.
Original languageEnglish
Title of host publicationnan
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9780769541655
ISBN (Print)9780769541655
DOIs
Publication statusPublished - 13 Sept 2010
Event2010 14th International Conference Information Visualisation - London
Duration: 26 Jul 201029 Jul 2010

Conference

Conference2010 14th International Conference Information Visualisation
CityLondon
Period26/07/1029/07/10
Other2010 14th International Conference Information Visualisation (26/07/2010-29/07/2010, London)

Keywords

  • Network Security

Fingerprint

Dive into the research topics of 'A visualisation technique for the identification of security threats in networked systems'. Together they form a unique fingerprint.

Cite this