2.50
Hdl Handle:
http://hdl.handle.net/10547/250947
Title:
Managing threats by the use of visualisation techniques
Authors:
Viduto, Valentina; Maple, Carsten; Huang, Wei
Abstract:
Identification of threats in networked systems is one of the important risk management processes that should be followed in order to be aware of all risks. In general, risk assessment guidelines for threat analysis propose to use historical organisation's data, thus, novel and unheard threats often are skipped from an analysis. In this paper, we propose a novel onion skin model (OSM) which consists of visualisation techniques, such as attack graphs, often applied for qualitative and quantitative risk assessment analyses. The model can be used to facilitate in threat identification and decision-making process by focusing on attack scenarios that illustrate vulnerable nodes, threats and shortest attack paths to the attacker's goal. The model can be used as part of risk management practices to improve security awareness through different attack scenarios and manage all system risks.
Citation:
Viduto, V., Maple, C., Huang, W. (2011) 'Managing threats by the use of visualisation techniques' International Journal of Space-Based and Situated Computing 1 (2/3):204-212
Publisher:
Inderscience
Journal:
International Journal of Space-Based and Situated Computing
Issue Date:
2011
URI:
http://hdl.handle.net/10547/250947
DOI:
10.1504/IJSSC.2011.040347
Additional Links:
http://www.inderscience.com/link.php?id=40347
Type:
Article
Language:
en
ISSN:
2044-4893; 2044-4907
Appears in Collections:
Centre for Wireless Research (CWR)

Full metadata record

DC FieldValue Language
dc.contributor.authorViduto, Valentinaen_GB
dc.contributor.authorMaple, Carstenen_GB
dc.contributor.authorHuang, Weien_GB
dc.date.accessioned2012-11-05T10:48:50Zen
dc.date.available2012-11-05T10:48:50Zen
dc.date.issued2011en
dc.identifier.citationViduto, V., Maple, C., Huang, W. (2011) 'Managing threats by the use of visualisation techniques' International Journal of Space-Based and Situated Computing 1 (2/3):204-212en_GB
dc.identifier.issn2044-4893en
dc.identifier.issn2044-4907en
dc.identifier.doi10.1504/IJSSC.2011.040347en
dc.identifier.urihttp://hdl.handle.net/10547/250947en
dc.description.abstractIdentification of threats in networked systems is one of the important risk management processes that should be followed in order to be aware of all risks. In general, risk assessment guidelines for threat analysis propose to use historical organisation's data, thus, novel and unheard threats often are skipped from an analysis. In this paper, we propose a novel onion skin model (OSM) which consists of visualisation techniques, such as attack graphs, often applied for qualitative and quantitative risk assessment analyses. The model can be used to facilitate in threat identification and decision-making process by focusing on attack scenarios that illustrate vulnerable nodes, threats and shortest attack paths to the attacker's goal. The model can be used as part of risk management practices to improve security awareness through different attack scenarios and manage all system risks.en_GB
dc.language.isoenen
dc.publisherInderscienceen_GB
dc.relation.urlhttp://www.inderscience.com/link.php?id=40347en_GB
dc.subjectonion skin modelen_GB
dc.subjectOSMen_GB
dc.subjectvisualisation techniquesen_GB
dc.subjectrisk managementen_GB
dc.subjectattack graphsen_GB
dc.subjectattack treesen_GB
dc.subjectnetwork hardeningen_GB
dc.subjectnetwork threatsen_GB
dc.subjectrisk assessmenten_GB
dc.subjectnetwork attacksen_GB
dc.subjectthreat identificationen_GB
dc.subjectdecision makingen_GB
dc.subjectvulnerable nodesen_GB
dc.subjectvulnerabilityen_GB
dc.subjectnetwork securityen_GB
dc.subjectattack scenariosen_GB
dc.titleManaging threats by the use of visualisation techniquesen
dc.typeArticleen
dc.identifier.journalInternational Journal of Space-Based and Situated Computingen_GB
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.