Pareto Efficient Solutions of Attack-Defence Trees
详细信息    查看全文
  • 作者:Zaruhi Aslanyan (15)
    Flemming Nielson (15)

    15. DTU Compute
    ; Technical University of Denmark ; Kgs. Lyngbyk ; Denmark
  • 关键词:Attack ; defence trees ; attack trees ; countermeasures ; security assessment ; Pareto efficiency ; multiple criteria
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2015
  • 出版时间:2015
  • 年:2015
  • 卷:9036
  • 期:1
  • 页码:95-114
  • 全文大小:319 KB
  • 参考文献:1. Vesely, W., Roberts, N., Haasl, D., Goldberg, F.: Fault Tree Handbook. Number v. 88 in Fault Tree Handbook. Systems and Reliability Research, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission (1981)
    2. Weiss, J.D.: A system security engineering process. In: Proceedings of the 14th National Computer Security Conference, pp. 572鈥?81 (1991)
    3. Schneier, B. (1999) Attack Trees: Modeling Security Threats. Dr. Dobb鈥檚 Journal of Software Tools 24: pp. 21-29
    4. Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: Availability, Reliability and Security, pp. 416鈥?23 (2006)
    5. Roy, A., Kim, D.S., Trivedi, K.S. (2012) Attack countermeasure trees (ACT): Towards unifying the constructs of attack and defense trees. Security and Communication Networks 5: pp. 929-943 CrossRef
    6. Kordy, B., Mauw, S., Radomirovi膰, S., Schweitzer, P. Foundations of attack鈥揹efense trees. In: Degano, P., Etalle, S., Guttman, J. eds. (2011) Formal Aspects of Security and Trust. Springer, Heidelberg, pp. 80-95 CrossRef
    7. Bagnato, A., Kordy, B., Meland, P.H., Schweitzer, P. (2012) Attribute decoration of attack-defense trees. IJSSE 3: pp. 1-35
    8. Kordy, B., Mauw, S., Melissen, M., Schweitzer, P. Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. In: Alpcan, T., Butty谩n, L., Baras, J.S. eds. (2010) Decision and Game Theory for Security. Springer, Heidelberg, pp. 245-256 CrossRef
    9. Girard, J.Y.: Linear logic: Its syntax and semantics. In: Proceedings of the Workshop on Advances in Linear Logic, pp. 1鈥?2. Cambridge University Press (1995)
    10. Legriel, J., Guernic, C., Cotton, S., Maler, O. Approximating the pareto front of multi-criteria optimization problems. In: Esparza, J., Majumdar, R. eds. (2010) Tools and Algorithms for the Construction and Analysis of Systems. Springer, Heidelberg, pp. 69-83 CrossRef
    11. Pi猫tre-Cambac茅d猫s, L., Bouissou, M.: Beyond attack trees: Dynamic security modeling with boolean logic driven markov processes (BDMP). In: Eighth European Dependable Computing Conference, EDCC-8 2010, pp. 199鈥?08 (2010)
    12. Kordy, B., Pi猫tre-Cambac茅d猫s, L., Schweitzer, P.: Dag-based attack and defense modeling: Don鈥檛 miss the forest for the attack trees. CoRR abs/1303.7397 (2013)
    13. Sheyner, O., Haines, J.W., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: IEEE S&P 2002, pp. 273鈥?84 (2002)
    14. Jha, S., Sheyner, O., Wing, J.M.: Two formal analyses of attack graphs. In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), pp. 49鈥?3 (2002)
    15. Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol.聽8414, pp. 285鈥?05. Springer, Heidelberg (2014)
    16. Khand, P.: System level security modeling using attack trees. In: Computer, Control and Communication, IC4 2009, pp. 1鈥? (2009)
    17. Amenaza: SecurITree, http://www.amenaza.com
    18. Isograph: AttackTree+, oftware/attacktree/" class="a-plus-plus"> http://www.isograph.com/software/attacktree/
    19. Vigo, R., Nielson, F., Riis Nielson, H.: Automated Generation of Attack Trees. In: 27th Computer Security Foundations Symposium (CSF 2014), pp. 337鈥?50. IEEE (2014)
    20. Mauw, S., Oostdijk, M. Foundations of attack trees. In: Won, D.H., Kim, S. eds. (2006) Information Security and Cryptology - ICISC 2005. Springer, Heidelberg, pp. 186-198 CrossRef
    21. Buldas, A., Laud, P., Priisalu, J., Saarepera, M., Willemson, J. Rational Choice of Security Measures Via Multi-Parameter Attack Trees. In: L贸pez, J. eds. (2006) Critical Information Infrastructures Security. Springer, Heidelberg, pp. 235-248 CrossRef
    22. J眉rgenson, A., Willemson, J. Computing exact outcomes of multi-parameter attack trees. In: Meersman, R., Tari, Z. eds. (2008) On the Move to Meaningful Internet Systems: OTM 2008. Springer, Heidelberg, pp. 1036-1051 CrossRef
    23. J眉rgenson, A., Willemson, J. On fast and approximate attack tree computations. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. eds. (2010) Information Security, Practice and Experience. Springer, Heidelberg, pp. 56-66 CrossRef
    24. Buldas, A., Lenin, A. New efficient utility upper bounds for the fully adaptive model of attack trees. In: Das, S.K., Nita-Rotaru, C., Kantarcioglu, M. eds. (2013) Decision and Game Theory for Security. Springer, Heidelberg, pp. 192-205 CrossRef
    25. Edge, K., Dalton, G., Raines, R., Mills, R.: Using attack and protection trees to analyze threats and defenses to homeland security. In: MILCOM 2006, pp. 1鈥?. IEEE (2006)
    26. Zonouz, S.A., Khurana, H., Sanders, W.H., Yardley, T.M.: RRE: A game-theoretic intrusion response and recovery engine. In: DSN 2009, pp. 439鈥?48 (2009)
    27. Kordy, B., Pouly, M., Schweitzer, P. Computational aspects of attack-defense trees. In: Bouvry, P., K艂opotek, M.A., Lepr茅vost, F., Marciniak, M., Mykowiecka, A., Rybi艅ski, H. eds. (2012) Security and Intelligent Information Systems. Springer, Heidelberg, pp. 103-116 CrossRef
    28. Kordy, B., Pouly, M., Schweitzer, P. A probabilistic framework for security scenarios with dependent actions. In: Albert, E., Sekerinski, E. eds. (2014) Integrated Formal Methods. Springer, Heidelberg, pp. 256-271 CrossRef
  • 作者单位:Principles of Security and Trust
  • 丛书名:978-3-662-46665-0
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out on a new and general formalism for attack-defence trees.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700