Optimal Scheduling of Agents in ADTrees: Specialised Algorithm and Declarative Models

05/08/2023
by   Jaime Arias, et al.
0

Expressing attack-defence trees in a multi-agent setting allows for studying a new aspect of security scenarios, namely how the number of agents and their task assignment impact the performance, e.g. attack time, of strategies executed by opposing coalitions. Optimal scheduling of agents' actions, a non-trivial problem, is thus vital. We discuss associated caveats and propose an algorithm that synthesises such an assignment, targeting minimal attack time and using the minimal number of agents for a given attack-defence tree. We also investigate an alternative approach for the same problem using Rewriting Logic, starting with a simple and elegant declarative model, whose correctness (in terms of schedule's optimality) is self-evident. We then refine this specification, inspired by the design of our specialised algorithm, to obtain an efficient system that can be used as a playground to explore various aspects of attack-defence trees. We compare the two approaches on different benchmarks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/18/2021

Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees

Expressing attack-defence trees in a multi-agent setting allows for stud...
research
06/12/2019

Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems

Attack-Defence Trees (ADTs) are well-suited to assess possible attacks t...
research
06/30/2020

Robust Multi-Agent Task Assignment in Failure-Prone and Adversarial Environments

The problem of assigning agents to tasks is a central computational chal...
research
03/17/2018

Attack Trees in Isabelle -- CTL semantics, correctness and completeness

In this paper, we present a proof theory for attack trees. Attack trees ...
research
09/12/2017

Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution

A core technique used by popular proxy-based circumvention systems like ...
research
12/27/2018

Attribute Evaluation on Attack Trees with Incomplete Information

Attack trees are considered a useful tool for security modelling because...
research
01/28/2022

Backdoors Stuck At The Frontdoor: Multi-Agent Backdoor Attacks That Backfire

Malicious agents in collaborative learning and outsourced data collectio...

Please sign up or login with your details

Forgot password? Click here to reset