ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs

نویسنده

  • Wolter Pieters
چکیده

Traditional information security modelling approaches often focus on containment of assets within boundaries. Due to what is called de-perimeterisation, such boundaries, for example in the form of clearly separated company networks, disappear. This paper argues that in a deperimeterised situation a focus on containment in security modelling is ineffective. Most importantly, the tree structure induced by the notion of containment is insufficient to model the interactions between digital, physical and social aspects of security. We use the sociological framework of actor-network theory to model information security starting from group membership instead of containment. The model is based on hypergraphs, and is also applicable to physical and social security measures. We provide algorithms for threat finding as well as examples.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Predicting Multi-actor collaborations using Hypergraphs

Social networks are now ubiquitous and most of them contain interactions involving multiple actors (groups) like author collaborations, teams or emails in an organizations, etc. Hypergraphs are natural structures to effectively capture multi-actor interactions which conventional dyadic graphs fail to capture. In this work the problem of predicting collaborations is addressed while modeling the ...

متن کامل

Explaining the Role of Management Accounting Information System in Strategy Formulation with Actors Network Approach

The real challenge of business environment is derived from a situation where organizations need to find opportunities on how to introduce ideas and new products to market that provide future earnings stream. Management accounting is used as a tool in this process and provides information on opportunities and threats. The purpose of this research is to explain the role of management accounting i...

متن کامل

The Symbiosis of Human and Semantic Technology Through the Lens of Actor-Network Theory

Background:  Semantic technologies (STs) have made machine reasoning possible by providing intelligent data management methods. This capability has created new forms of interaction between humans and STs, which is called "semantic interaction."  The increasing spread of this form of interaction in daily life reveals the need to identify the factors affecting it and introduce the requirements of...

متن کامل

One-mode projection analysis and design of covert affiliation networks

Decision makers in the field of national security, counterterrorism and counterinsurgency are faced with an uncertain, adaptive and asymmetrical threat. It should come as no surprise that a great need exists to understand covert organizations, the structure of which becomes known partially only after an attack or operation has occurred. What is known however is that many covert networks are org...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010