skip to main content
10.1145/1314257.1314272acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

AMBRA: automated model-based risk analysis

Published: 29 October 2007 Publication History

Abstract

Risk analysis is the starting baseline that helps to choose what technical and procedural security measures an organisation must employ. In spite of its importance, due to its complexity and its relative immaturity, this issue burdens on the arm of security experts at the moment, with little automation of the process. In this work, we show a methodology based on existing standards, highlighting tasks automatically-performable, and describe how it is possible to automate these aspects in our model.

References

[1]
Y. Asnar, P. Giorgini, and J. Mylopoulos. Risk modelling and reasoning in goal models. Technical Report DIT-06-008, Informatica e Telecomunicazioni, University of Trento, March 2006.
[2]
G. Braedeland and K. Stolen. Using model-based security analysis in component-oriented system development. In Proc. of the 2nd ACM workshop on Quality of protection (QoP'06), pages 11--18, 30 October 2006.
[3]
CCTA. CCTA risk analysis and management method (CRAMM). http://www.cramm.com.
[4]
The CORAS project. http://coras.sourceforge.net/.
[5]
FIRST. Common Vulnerability Scoring System (CVSS). http://www.first.org/cvss/cvss-guide.html.
[6]
E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley Professional, 1995.
[7]
Gamma Secure Systems. A practitioner's view of CRAMM. http://www.gammassl.co.uk/topics/hot5.html.
[8]
J. Hallberg, A. Hunstad, and M. Peterson. A framework for system security assessment. In Proc. of the 6th IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop (IAW), pages 224--231, 15-17 June 2005.
[9]
J. D. Howard. An Analysis Of Security Incidents On The Internet 1989 - 1995. http://www.cert.org/research/JHThesis/, 7 April 1997.
[10]
ISO/IEC 17799. Information technology - Security techniques - Code of practice for information security management. 2005.
[11]
ISO/IEC Guide 73:2002. Risk management - Vocabulary - Guidelines for use in standards. 2002.
[12]
E. Jonsson. An integrated framework for security and dependability. In Proc. of the 1998 workshop on New security paradigms (NSPW'98), pages 22--29, 22-25 September 1998.
[13]
N. Kavantzas, D. Burdett, G. Ritzinger, T. Fletcher, Y. Lafon, and C. Barreto. Web services choreography description language version 1.0. W3C Recommendation, http://www.w3.org/TR/ws-cdl-10/, November 2005.
[14]
J. Kephart and D. Chess. The vision of autonomic computing. Computer, 36:41--50, January 2003.
[15]
H. Langweg and E. Snekkenes. A classification of malicious software attacks. In Proc. of 23rd IEEE Int. Conference on Performance, Computing, and Communications, pages 827--832, 15-17 April 2004.
[16]
B. Martin, C. Sullo, and J. Kouns. OSVDB: Open Source Vulnerability Database. http://www.osvdb.org/database-info.php.
[17]
N. Mayer, A. Rifaut, and E. Dubois. Towards a risk-based security requirements engineering framework. In Proc. of 11th Int. Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'05), Porto, Portugal, pages 83--98, 13-14 June 2005.
[18]
Microsoft Corporation. Understanding the SDM to SML evolution. http://www.microsoft.com/business/dsi/sdmwp.mspx, 16 February 2007.
[19]
Ministerio de Administraciones Publicas. Methodology for information systems risk analysis and management (MAGERIT) version 2. http://www.csae.map.es/.
[20]
MITRE. Common vulnerabilities and exposures web site. http://www.cve.mitre.org/.
[21]
S. Naqvi and M. Riguidel. Quantifiable security metrics for large scale heterogeneous systems. In Proc. of 40th IEEE Int. Carnahan Conference on Security Technology, pages 209--215, 16-19 October 2006.
[22]
NIST. National vulnerability database. http://nvd.nist.gov/.
[23]
POSITIF Project. System Description Language (PSDL) and Security Policy Language (PSPL). http://www.positif.org/.
[24]
B. Schneier. The Psychology of Security. http://www.schneier.com/essay-155.html, 28 February 2007.
[25]
SERENITY Project. Report on state of the art workflow security technology. http://www.serenity-forum.org/.
[26]
G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf, July 2002.
[27]
The DMTF Technical Committee. The Common Information Model. http://www.dmtf.org/standards/cim.

Cited By

View all
  • (2011)E-Business and Information Security Risk ManagementElectronic Business Interoperability10.4018/978-1-60960-485-1.ch024(596-614)Online publication date: 2011
  • (2011)Continuous mission-oriented assessment (CMA) of assuranceProceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops10.1109/DSNW.2011.5958861(33-38)Online publication date: 27-Jun-2011
  • (2009)Quantified security is a weak hypothesisProceedings of the 2009 workshop on New security paradigms workshop10.1145/1719030.1719036(37-50)Online publication date: 8-Sep-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
QoP '07: Proceedings of the 2007 ACM workshop on Quality of protection
October 2007
64 pages
ISBN:9781595938855
DOI:10.1145/1314257
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computer-aided risk analysis
  2. security metrics
  3. system modelling

Qualifiers

  • Article

Conference

CCS07
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2011)E-Business and Information Security Risk ManagementElectronic Business Interoperability10.4018/978-1-60960-485-1.ch024(596-614)Online publication date: 2011
  • (2011)Continuous mission-oriented assessment (CMA) of assuranceProceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops10.1109/DSNW.2011.5958861(33-38)Online publication date: 27-Jun-2011
  • (2009)Quantified security is a weak hypothesisProceedings of the 2009 workshop on New security paradigms workshop10.1145/1719030.1719036(37-50)Online publication date: 8-Sep-2009
  • (2009)Formalizing information security knowledgeProceedings of the 4th International Symposium on Information, Computer, and Communications Security10.1145/1533057.1533084(183-194)Online publication date: 10-Mar-2009
  • (2008)The risks with security metricsProceedings of the 4th ACM workshop on Quality of protection10.1145/1456362.1456376(65-70)Online publication date: 27-Oct-2008
  • (2008)Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and SimulationProceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies10.1109/SECURWARE.2008.59(356-361)Online publication date: 25-Aug-2008
  • (2008)A framework for measuring the vulnerability of hosts2008 1st International Conference on Information Technology10.1109/INFTECH.2008.4621610(1-4)Online publication date: May-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media