A survey on the usability and practical applications of Graphical Security Models

Jin B. Hong, Dong Seong Kim, Chun Jen Chung, Dijiang Huang

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evaluation techniques), the networked system is evolving with many hosts and frequently changing topologies (e.g., Cloud, SDN, IoT etc.). To investigate the usability of GrSMs, this survey summarizes the characteristics of past research studies in terms of their development and computational complexity analysis, and specify their applications in terms of security metrics, availability of tools and their applicable domains. We also discuss the practical issues of modeling security, differences of GrSMs and their usability for future networks that are large and dynamic.

Original languageEnglish
Pages (from-to)1-16
Number of pages16
JournalComputer Science Review
Volume26
DOIs
Publication statusPublished - 1 Nov 2017
Externally publishedYes

Fingerprint

Security Model
Graphical Models
Usability
Complexity Analysis
Computational Analysis
Evaluation
Computational complexity
Computational Complexity
Availability
Topology
Metric
Modeling
Model

Cite this

Hong, Jin B. ; Kim, Dong Seong ; Chung, Chun Jen ; Huang, Dijiang. / A survey on the usability and practical applications of Graphical Security Models. In: Computer Science Review. 2017 ; Vol. 26. pp. 1-16.
@article{de7fa6d00e824dd19679360f84b2dd8c,
title = "A survey on the usability and practical applications of Graphical Security Models",
abstract = "This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evaluation techniques), the networked system is evolving with many hosts and frequently changing topologies (e.g., Cloud, SDN, IoT etc.). To investigate the usability of GrSMs, this survey summarizes the characteristics of past research studies in terms of their development and computational complexity analysis, and specify their applications in terms of security metrics, availability of tools and their applicable domains. We also discuss the practical issues of modeling security, differences of GrSMs and their usability for future networks that are large and dynamic.",
keywords = "Attack graphs, Attack trees, Security analysis, Security metrics, Security models",
author = "Hong, {Jin B.} and Kim, {Dong Seong} and Chung, {Chun Jen} and Dijiang Huang",
year = "2017",
month = "11",
day = "1",
doi = "10.1016/j.cosrev.2017.09.001",
language = "English",
volume = "26",
pages = "1--16",
journal = "Computer Science Review",
issn = "1574-0137",
publisher = "Elsevier",

}

A survey on the usability and practical applications of Graphical Security Models. / Hong, Jin B.; Kim, Dong Seong; Chung, Chun Jen; Huang, Dijiang.

In: Computer Science Review, Vol. 26, 01.11.2017, p. 1-16.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A survey on the usability and practical applications of Graphical Security Models

AU - Hong, Jin B.

AU - Kim, Dong Seong

AU - Chung, Chun Jen

AU - Huang, Dijiang

PY - 2017/11/1

Y1 - 2017/11/1

N2 - This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evaluation techniques), the networked system is evolving with many hosts and frequently changing topologies (e.g., Cloud, SDN, IoT etc.). To investigate the usability of GrSMs, this survey summarizes the characteristics of past research studies in terms of their development and computational complexity analysis, and specify their applications in terms of security metrics, availability of tools and their applicable domains. We also discuss the practical issues of modeling security, differences of GrSMs and their usability for future networks that are large and dynamic.

AB - This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evaluation techniques), the networked system is evolving with many hosts and frequently changing topologies (e.g., Cloud, SDN, IoT etc.). To investigate the usability of GrSMs, this survey summarizes the characteristics of past research studies in terms of their development and computational complexity analysis, and specify their applications in terms of security metrics, availability of tools and their applicable domains. We also discuss the practical issues of modeling security, differences of GrSMs and their usability for future networks that are large and dynamic.

KW - Attack graphs

KW - Attack trees

KW - Security analysis

KW - Security metrics

KW - Security models

UR - http://www.scopus.com/inward/record.url?scp=85036477563&partnerID=8YFLogxK

U2 - 10.1016/j.cosrev.2017.09.001

DO - 10.1016/j.cosrev.2017.09.001

M3 - Article

VL - 26

SP - 1

EP - 16

JO - Computer Science Review

JF - Computer Science Review

SN - 1574-0137

ER -