The paper considers techniques for measurement and calculation of security metrics taking into account attack graphs and service dependencies. The techniques are based on several assessment levels (topological, attack graph level, attacker level, events level and system level) and important aspects (zero-day attacks, cost-efficiency characteristics). It allows understanding the current security situation, including defining the vulnerable characteristics and weaknesses of the system under protection, dangerous events, current and possible cyber attack parameters, attacker intentions, integral cyber situation metrics and necessary countermeasures.
Glenn FinkDaniel M. BestDavid O. ManzViatcheslav M. PopovskyBarbara Endicott‐Popovsky
Palvi AggarwalFrédéric MoisanCleotilde GonzálezVarun Dutt