VGTU talpykla > Fundamentinių mokslų fakultetas / Faculty of Fundamental Sciences > Moksliniai straipsniai / Research articles >

Lietuvių   English
Please use this identifier to cite or link to this item: http://dspace.vgtu.lt/handle/1/4119

Title: Method for Attack Tree Data Transformation and Import Into IT Risk Analysis Expert Systems
Authors: Vitkus, Donatas
Salter, Jonathan Steven
Goranin, Nikolaj
Čeponis, Dainius
Keywords: expert systems
attack trees
risk analysis
information security
JESS
ATTop
Mitre transformation
Issue Date: 2020
Publisher: MDPI
Citation: Vitkus, D.; Salter, J.; Goranin, N.; Čeponis, D. Method for Attack Tree Data Transformation and Import Into IT Risk Analysis Expert Systems. Appl. Sci. 2020, 10, 8423.
Series/Report no.: 10;23
Abstract: Information technology (IT) security risk analysis preventatively helps organizations in identifying their vulnerable systems or internal controls. Some researchers propose expert systems (ES) as the solution for risk analysis automation since risk analysis by human experts is expensive and timely. By design, ES need a knowledge base, which must be up to date and of high quality. Manual creation of databases is also expensive and cannot ensure stable information renewal. These facts make the knowledge base automation process very important. This paper proposes a novel method of converting attack trees to a format usable by expert systems for utilizing the existing attack tree repositories in facilitating information and IT security risk analysis. The method performs attack tree translation into the Java Expert System Shell (JESS) format, by consistently applying ATTop, a software bridging tool that enables automated analysis of attack trees using a model-driven engineering approach, translating attack trees into the eXtensible Markup Language (XML) format, and using the newly developed ATES (attack trees to expert system) program, performing further XML conversion into JESS compatible format. The detailed method description, along with samples of attack tree conversion and results of conversion experiments on a significant number of attack trees, are presented and discussed. The results demonstrate the high method reliability rate and viability of attack trees as a source for the knowledge bases of expert systems used in the IT security risk analysis process.
Description: This article belongs to the Special Issue Human-Centered Computing and Information Security: Recent Advances & Intelligent Applications
URI: http://dspace.vgtu.lt/handle/1/4119
ISSN: 2076-3417
Appears in Collections:Moksliniai straipsniai / Research articles

Files in This Item:

File Description SizeFormat
Method for Attack Tree Data Transformation and Import Into IT Risk Analysis Expert Systems.pdf1.45 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback