Network security supported by arguments

Argumentation has been proved as a simple yet powerful approach to manage conflicts in reasoning with the purpose to find subsets of “surviving” arguments. Our intent is to exploit such form of resolution to support the administration of security in complex systems, e.g., in case threat countermeasures are in conflict with non-functional requirements. The proposed formalisation is able to find the required security controls and explicitly provide arguments supporting this selection. Therefore, an explanation automatically comes as part of the suggested solution, facilitating human comprehension.

[1]  Claudette Cayrol,et al.  On the Acceptability of Arguments in Preference-based Argumentation , 1998, UAI.

[2]  Shawn A. Butler Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.

[3]  日本規格協会 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .

[4]  Carol Woody,et al.  Introduction to the OCTAVE ® Approach , 2003 .

[5]  Stefano Bistarelli,et al.  A First Comparison of Abstract Argumentation Reasoning-Tools , 2014, ECAI.

[6]  Gary Stoneburner,et al.  SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .

[7]  Guido Boella,et al.  Argumentation for Access Control , 2005, AI*IA.

[8]  Simon Parsons,et al.  Arguing About Firewall Policy , 2012, COMMA.

[9]  Phan Minh Dung,et al.  On the Acceptability of Arguments and its Fundamental Role in Nonmonotonic Reasoning, Logic Programming and n-Person Games , 1995, Artif. Intell..

[10]  Trevor J. M. Bench-Capon,et al.  Argumentation in artificial intelligence , 2007, Artif. Intell..

[11]  Stefano Bistarelli,et al.  Benchmarking Hard Problems in Random Abstract AFs: The Stable Semantics , 2014, COMMA.

[12]  Elizabeth Sklar,et al.  Argumentation logic to assist in security administration , 2012, NSPW '12.

[13]  Francesco Santini,et al.  Debating Cybersecurity or Securing a Debate? - (Position Paper) , 2014, FPS.

[14]  Alessandra Russo,et al.  Using argumentation logic for firewall configuration management , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.

[15]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[16]  Stefano Bistarelli,et al.  Enumerating Extensions on Random Abstract-AFs with ArgTools, Aspartix, ConArg2, and Dung-O-Matic , 2014, CLIMA.

[17]  Tarek Bouyahia,et al.  Metric for Security Activities Assisted by Argumentative Logic , 2014, DPM/SETOP/QASA.

[18]  Ibrahim Sogukpinar,et al.  ISRAM: information security risk analysis method , 2005, Comput. Secur..

[19]  Alessandra Russo,et al.  Using Argumentation Logic for Firewall Policy Specification and Analysis , 2006, DSOM.