• Skip to content (access key 1)
  • Skip to search (access key 7)
FWF — Austrian Science Fund
  • Go to overview page Discover

    • Research Radar
      • Research Radar Archives 1974–1994
    • Discoveries
      • Emmanuelle Charpentier
      • Adrian Constantin
      • Monika Henzinger
      • Ferenc Krausz
      • Wolfgang Lutz
      • Walter Pohl
      • Christa Schleper
      • Elly Tanaka
      • Anton Zeilinger
    • Impact Stories
      • Verena Gassner
      • Wolfgang Lechner
      • Georg Winter
    • scilog Magazine
    • Austrian Science Awards
      • FWF Wittgenstein Awards
      • FWF ASTRA Awards
      • FWF START Awards
      • Award Ceremony
    • excellent=austria
      • Clusters of Excellence
      • Emerging Fields
    • In the Spotlight
      • 40 Years of Erwin Schrödinger Fellowships
      • Quantum Austria
    • Dialogs and Talks
      • think.beyond Summit
    • Knowledge Transfer Events
    • E-Book Library
  • Go to overview page Funding

    • Portfolio
      • excellent=austria
        • Clusters of Excellence
        • Emerging Fields
      • Projects
        • Principal Investigator Projects
        • Principal Investigator Projects International
        • Clinical Research
        • 1000 Ideas
        • Arts-Based Research
        • FWF Wittgenstein Award
      • Careers
        • ESPRIT
        • FWF ASTRA Awards
        • Erwin Schrödinger
        • doc.funds
        • doc.funds.connect
      • Collaborations
        • Specialized Research Groups
        • Special Research Areas
        • Research Groups
        • International – Multilateral Initiatives
        • #ConnectingMinds
      • Communication
        • Top Citizen Science
        • Science Communication
        • Book Publications
        • Digital Publications
        • Open-Access Block Grant
      • Subject-Specific Funding
        • AI Mission Austria
        • Belmont Forum
        • ERA-NET HERA
        • ERA-NET NORFACE
        • ERA-NET QuantERA
        • ERA-NET TRANSCAN
        • Alternative Methods to Animal Testing
        • European Partnership Biodiversa+
        • European Partnership BrainHealth
        • European Partnership ERA4Health
        • European Partnership ERDERA
        • European Partnership EUPAHW
        • European Partnership FutureFoodS
        • European Partnership OHAMR
        • European Partnership PerMed
        • European Partnership Water4All
        • Gottfried and Vera Weiss Award
        • netidee SCIENCE
        • Herzfelder Foundation Projects
        • Quantum Austria
        • Rückenwind Funding Bonus
        • WE&ME Award
        • Zero Emissions Award
      • International Collaborations
        • Belgium/Flanders
        • Germany
        • France
        • Italy/South Tyrol
        • Japan
        • Luxembourg
        • Poland
        • Switzerland
        • Slovenia
        • Taiwan
        • Tyrol–South Tyrol–Trentino
        • Czech Republic
        • Hungary
    • Step by Step
      • Find Funding
      • Submitting Your Application
      • International Peer Review
      • Funding Decisions
      • Carrying out Your Project
      • Closing Your Project
      • Further Information
        • Integrity and Ethics
        • Inclusion
        • Applying from Abroad
        • Personnel Costs
        • PROFI
        • Final Project Reports
        • Final Project Report Survey
    • FAQ
      • Project Phase PROFI
      • Project Phase Ad Personam
      • Expiring Programs
        • Elise Richter and Elise Richter PEEK
        • FWF START Awards
  • Go to overview page About Us

    • Mission Statement
    • FWF Video
    • Values
    • Facts and Figures
    • Annual Report
    • What We Do
      • Research Funding
        • Matching Funds Initiative
      • International Collaborations
      • Studies and Publications
      • Equal Opportunities and Diversity
        • Objectives and Principles
        • Measures
        • Creating Awareness of Bias in the Review Process
        • Terms and Definitions
        • Your Career in Cutting-Edge Research
      • Open Science
        • Open-Access Policy
          • Open-Access Policy for Peer-Reviewed Publications
          • Open-Access Policy for Peer-Reviewed Book Publications
          • Open-Access Policy for Research Data
        • Research Data Management
        • Citizen Science
        • Open Science Infrastructures
        • Open Science Funding
      • Evaluations and Quality Assurance
      • Academic Integrity
      • Science Communication
      • Philanthropy
      • Sustainability
    • History
    • Legal Basis
    • Organization
      • Executive Bodies
        • Executive Board
        • Supervisory Board
        • Assembly of Delegates
        • Scientific Board
        • Juries
      • FWF Office
    • Jobs at FWF
  • Go to overview page News

    • News
    • Press
      • Logos
    • Calendar
      • Post an Event
      • FWF Informational Events
    • Job Openings
      • Enter Job Opening
    • Newsletter
  • Discovering
    what
    matters.

    FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

    SOCIAL MEDIA

    • LinkedIn, external URL, opens in a new window
    • , external URL, opens in a new window
    • Facebook, external URL, opens in a new window
    • Instagram, external URL, opens in a new window
    • YouTube, external URL, opens in a new window

    SCILOG

    • Scilog — The science magazine of the Austrian Science Fund (FWF)
  • elane login, external URL, opens in a new window
  • Scilog external URL, opens in a new window
  • de Wechsle zu Deutsch

  

MOSES 3

MOSES 3

Christine Strauss (ORCID: )
  • Grant DOI 10.55776/P23122
  • Funding program Principal Investigator Projects
  • Status ended
  • Start September 1, 2011
  • End August 31, 2015
  • Funding amount € 200,372

Disciplines

Computer Sciences (40%); Mathematics (40%); Economics (20%)

Keywords

    Information Security Management, Portfolio Analysis, Attacker Behavioor Modeling, Multi-objective Simulation Optimization, Security Ontology Engineering, Interactive Decision Support

Abstract Final report

Most organizations today have become critically dependent on information systems to perform their mission. At the same time, the frequency and sophistication of threats to these systems is growing dramatically as attackers are becoming more goal-driven and criminally inclined. This development leads to an unprecedented potential for information security incidents to negatively impact businesses` reputation, profitability, and customer confidence and to threaten their very existence. It is therefore not surprising that information security has become a major concern among enterprises. However, given the complex nature of information security problems and the vast and diverse array of available means that aim to improve it (e.g. virus scanners, firewalls, encryption, intrusion detection, two-factor authentication, access control systems, security policies, security awareness training etc.), decision makers struggle to identify the best ways to counteract the threats they face and consequently tend to base investment decisions primarily on immediate local needs. This reactive ad-hoc approach to information security typically leads to an inefficient allocation of scarce resources. The proposed project tackles the highly relevant and theoretically challenging problem of strategically selecting an appropriate portfolio (i.e. bundle) of information security safeguards. To this end, we intend to conceptualize and develop a quantitative method that supports decision makers in striking a balance between monetary and non- monetary risk, cost, and benefit criteria. The proposed method is based on a framework that comprises ontological modeling of security knowledge, dynamic attack tree generation techniques, stochastic attack simulation, meta- heuristic identification of efficient portfolios, and interactive decision support. Our approach rests upon a holistic evaluation and optimization of the total effectiveness of all implemented safeguards rather than on an assessment of individual information security investment opportunities (an approach that neglects synergies and complex interactions). Moreover, our approach explicitly takes into account characteristics of the organization, its information infrastructure and information assets and the threat sources it faces by modeling human attackers as rational, goal-oriented agents. We rely on heavyweight ontologies to represent rich security knowledge and harness that knowledge through automated reasoning which enables novel techniques to infer possible routes of attacks and generate individual attack trees based on attackers` motivation, objectives, capabilities, and available entry points. The results of the project should facilitate better information security investment decision-making through multi- criteria decision support. To achieve this objective, we follow an interdisciplinary research approach that draws on a variety of disciplines including Management, Operations Research, Computer Science, and Information Security. The project will yield a prototypical implementation of the method to enable an evaluation of the proposed approach by means of a case study.

Many organizations today struggle to secure their information technology infrastructures and ensure adequate protection of critical data. To this end, decision-makers have a wide array of measures at their disposal, including virus scanners, firewalls, access control, intrusion detection systems, encryption etc. However, deciding which measures to take and where in a complex information system to deploy them, is difficult. Available resources are typically limited and "perfect" security is generally not attainable. It is therefore necessary to strike a balance between cost and adequate protection with respect to the threats that an organization faces.The Moses3 project developed a new approach to optimize the security of IT infrastructures through the identification of efficient combinations of security measures. To this end, it developed methods for the formal modeling and simulation of attacks in order to assess the potential impact that various adversaries may cause. A software prototype developed in the course of the project can test a large number of possible configurations and "breed" efficient designs by means of a genetic algorithm. Decision-makers can then interactively explore the results and trade off high-level objectives such as the cost of security measures and the estimated potential impact on the confidentiality, integrity and availability of information assets. Rather than confronting them with the underlying technical aspects of security measures and the intricacies of how they act in concert, this approach casts the problem in terms that non-expert decision-makers can relate to. On the other hand, the developed method also allows sophisticated users to conduct detailed analyses of simulated attacks in order to identify structural weaknesses and derive general insights about the security of an information system. Thereby, the developed approach helps to bridge the gap between technical and managerial perspectives and contributes towards a better understanding of relevant threats, critical assets that need to be protected, and potential routes of attack. The developed method was validated through extensive interviews with experts from multiple security domains. Research in the project thereby laid the foundation for subsequent development in an applied context.

Research institution(s)
  • Secure Business Austria – SBA - 100%

Research Output

  • 53 Citations
  • 11 Publications
Publications
  • 2012
    Title A multi-objective decision support framework for simulation-based security control selection.
    Type Conference Proceeding Abstract
    Author Kiesling E
    Conference Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES 2012), Prague
  • 2012
    Title A multi-objective decision support framework for simulation-based security control selection
    DOI 10.1109/ares.2012.70
    Type Conference Proceeding Abstract
    Author Kiesling E
    Pages 454-462
  • 2015
    Title Integrating attacker behavior in IT security analysis: a discrete-event simulation approach
    DOI 10.1007/s10799-015-0232-6
    Type Journal Article
    Author Ekelhart A
    Journal Information Technology and Management
    Pages 221-233
  • 2015
    Title Multi-objective evolutionary optimization of computation-intensive simulations - The case of security control selection.
    Type Conference Proceeding Abstract
    Author Grill B
    Conference Proceedings of the 11th Metaheuristics International Conference (MIC 2015)
  • 2016
    Title Selecting security control portfolios: a multi-objective simulation-optimization approach
    DOI 10.1007/s40070-016-0055-7
    Type Journal Article
    Author Kiesling E
    Journal EURO Journal on Decision Processes
    Pages 85-117
    Link Publication
  • 2014
    Title Komplexe Systeme, heterogene Angreifer und vielfältige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterstützung im IT-Sicherheitsmanagement.
    Type Conference Proceeding Abstract
    Author Ekelhart A
    Conference Katzenbeisser S., Lotz V., and Weippl E. (eds.) Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.(GI) Lecture Notes in Informatics (LNI) GI-Edition, Gesellschaft für Informatik Bonn
  • 2014
    Title Evolving Secure Information Systems through Attack Simulation
    DOI 10.1109/hicss.2014.597
    Type Conference Proceeding Abstract
    Author Kiesling E
    Pages 4868-4877
    Link Publication
  • 2013
    Title Simulation-based optimization of IT security controls: Initial experiences with metaheuristic solution procedures.
    Type Conference Proceeding Abstract
    Author Kiesling E
    Conference Abstracts: Proceedings of the 14th EU/ME Workshop, Hamburg.
  • 2013
    Title Multi-objective decision support for IT security control selection.
    Type Conference Proceeding Abstract
    Author Kiesling E
    Conference EURO-INFORMS European Conference on Operational Research (EURO XXVI), Abstract book
  • 2013
    Title A simulation-optimization approach for information security risk Management.
    Type Conference Proceeding Abstract
    Author Keisling E
    Conference International Conference on Operations Research (OR 2013), Abstract book
  • 2013
    Title SIMULATION-BASED OPTIMIZATION OF INFORMATION SECURITY CONTROLS: AN ADVERSARY-CENTRIC APPROACH
    DOI 10.1109/wsc.2013.6721583
    Type Conference Proceeding Abstract
    Author Kiesling E
    Pages 2054-2065

Discovering
what
matters.

Newsletter

FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

Contact

Austrian Science Fund (FWF)
Georg-Coch-Platz 2
(Entrance Wiesingerstraße 4)
1010 Vienna

office(at)fwf.ac.at
+43 1 505 67 40

General information

  • Job Openings
  • Jobs at FWF
  • Press
  • Philanthropy
  • scilog
  • FWF Office
  • Social Media Directory
  • LinkedIn, external URL, opens in a new window
  • , external URL, opens in a new window
  • Facebook, external URL, opens in a new window
  • Instagram, external URL, opens in a new window
  • YouTube, external URL, opens in a new window
  • Cookies
  • Whistleblowing/Complaints Management
  • Accessibility Statement
  • Data Protection
  • Acknowledgements
  • IFG-Form
  • Social Media Directory
  • © Österreichischer Wissenschaftsfonds FWF
© Österreichischer Wissenschaftsfonds FWF