Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems

06/12/2019
by   Jaime Arias, et al.
0

Attack-Defence Trees (ADTs) are well-suited to assess possible attacks to systems and the efficiency of counter-measures. In this paper, we first enrich the available constructs with reactive patterns that cover further security scenarios, and equip all constructs with attributes such as time and cost to allow quantitative analyses. Then, ADTs are modelled as (an extension of) Asynchronous Multi-Agents Systems–EAMAS. The ADT-EAMAS transformation is performed in a systematic manner that ensures correctness. The transformation allows us to quantify the impact of different agents configurations on metrics such as attack time. Using EAMAS also permits parametric verification: we derive constraints for property satisfaction. Our approach is exercised on several case studies using the Uppaal and IMITATOR tools.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/18/2021

Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees

Expressing attack-defence trees in a multi-agent setting allows for stud...
research
03/17/2018

Attack Trees in Isabelle -- CTL semantics, correctness and completeness

In this paper, we present a proof theory for attack trees. Attack trees ...
research
05/08/2023

Optimal Scheduling of Agents in ADTrees: Specialised Algorithm and Declarative Models

Expressing attack-defence trees in a multi-agent setting allows for stud...
research
02/12/2019

Parametric analyses of attack-fault trees

Risk assessment of cyber-physical systems, such as power plants, connect...
research
03/17/2018

Attack Trees in Isabelle

In this paper, we present a proof theory for attack trees. Attack trees ...
research
04/13/2022

On Validating Attack Trees with Attack Effects: An Approach from Barwise-Seligman's Channel Theory

In security analysis, attack trees are a major tool for showing the stru...
research
09/17/2023

ATM: a Logic for Quantitative Security Properties on Attack Trees

Critical infrastructure systems - for which high reliability and availab...

Please sign up or login with your details

Forgot password? Click here to reset