Attribute Evaluation on Attack Trees with Incomplete Information

12/27/2018
by   Ahto Buldas, et al.
0

Attack trees are considered a useful tool for security modelling because they support qualitative as well as quantitative analysis. The quantitative approach is based on values associated to each node in the tree, expressing, for instance, the minimal cost or probability of an attack. Current quantitative methods for attack trees allow the analyst to, based on an initial assignment of values to the leaf nodes, derive the values of the higher nodes in the tree. In practice, however, it shows to be very difficult to obtain reliable values for all leaf nodes. The main reasons are that data is only available for some of the nodes, that data is available for intermediate nodes rather than for the leaf nodes, or even that the available data is inconsistent. We address these problems by developing a generalisation of the standard bottom-up calculation method in three ways. First, we allow initial attributions of non-leaf nodes. Second, we admit additional relations between attack steps beyond those provided by the underlying attack tree semantics. Third, we support the calculation of an approximative solution in case of inconsistencies. We illustrate our method, which is based on constraint programming, by a comprehensive case study.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/16/2021

Efficient Algorithms for Quantitative Attack Tree Analysis

Numerous analysis methods for quantitative attack tree analysis have bee...
research
01/21/2021

Quantitative Security Risk Modeling and Analysis with RisQFLan

Domain-specific quantitative modeling and analysis approaches are fundam...
research
11/09/2021

Attack time analysis in dynamic attack trees via integer linear programming

Attack trees are an important tool in security analysis, and an importan...
research
12/10/2022

Efficient and Generic Algorithms for Quantitative Attack Tree Analysis

Numerous analysis methods for quantitative attack tree analysis have bee...
research
01/18/2021

Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees

Expressing attack-defence trees in a multi-agent setting allows for stud...
research
09/17/2023

ATM: a Logic for Quantitative Security Properties on Attack Trees

Critical infrastructure systems - for which high reliability and availab...
research
05/08/2023

Optimal Scheduling of Agents in ADTrees: Specialised Algorithm and Declarative Models

Expressing attack-defence trees in a multi-agent setting allows for stud...

Please sign up or login with your details

Forgot password? Click here to reset