Issue Date
2011Subjects
onion skin modelOSM
visualisation techniques
risk management
attack graphs
attack trees
network hardening
network threats
risk assessment
network attacks
threat identification
decision making
vulnerable nodes
vulnerability
network security
attack scenarios
Metadata
Show full item recordAbstract
Identification of threats in networked systems is one of the important risk management processes that should be followed in order to be aware of all risks. In general, risk assessment guidelines for threat analysis propose to use historical organisation's data, thus, novel and unheard threats often are skipped from an analysis. In this paper, we propose a novel onion skin model (OSM) which consists of visualisation techniques, such as attack graphs, often applied for qualitative and quantitative risk assessment analyses. The model can be used to facilitate in threat identification and decision-making process by focusing on attack scenarios that illustrate vulnerable nodes, threats and shortest attack paths to the attacker's goal. The model can be used as part of risk management practices to improve security awareness through different attack scenarios and manage all system risks.Citation
Viduto, V., Maple, C., Huang, W. (2011) 'Managing threats by the use of visualisation techniques' International Journal of Space-Based and Situated Computing 1 (2/3):204-212Publisher
InderscienceAdditional Links
http://www.inderscience.com/link.php?id=40347Type
ArticleLanguage
enISSN
2044-48932044-4907
ae974a485f413a2113503eed53cd6c53
10.1504/IJSSC.2011.040347