2014
DOI: 10.1007/978-3-319-10181-1_16
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Framework for Security Scenarios with Dependent Actions

Abstract: International audienceThis work addresses the growing need of performing meaningful probabilistic analysis of security. We propose a framework that integrates the graphical security modeling technique of attack–defense trees with probabilistic information expressed in terms of Bayesian networks. This allows us to perform probabilistic evaluation of attack–defense scenarios involving dependent actions. To improve the efficiency of our computations, we make use of inference algorithms from Bayesian networks and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…1 that, if all labels in a tree are unique, then the resulting attack-tree decoration problem based on this bottom-up attribute constraint-set is either undetermined or determined. We remark, nonetheless, that our methodology can also be used to model other computational approaches such as the Bayesian reasoning proposed by Kordy, Pouly, and Schweitzer [32]. It is ultimately the analyst who decides what constitutes a set of hard predicates, although we require the analyst to come up with hard predicates that are satisfiable; as we do in this article.…”
Section: Hard Predicatesmentioning
confidence: 99%
“…1 that, if all labels in a tree are unique, then the resulting attack-tree decoration problem based on this bottom-up attribute constraint-set is either undetermined or determined. We remark, nonetheless, that our methodology can also be used to model other computational approaches such as the Bayesian reasoning proposed by Kordy, Pouly, and Schweitzer [32]. It is ultimately the analyst who decides what constitutes a set of hard predicates, although we require the analyst to come up with hard predicates that are satisfiable; as we do in this article.…”
Section: Hard Predicatesmentioning
confidence: 99%
“…We consider a modified version of a simple scenario borrowed from [19], where an attacker wants to infect a computer with a virus. In order to do so, the attacker needs to put the virus file on the system and only after that execute it.…”
Section: Well-formedness the Syntax Inmentioning
confidence: 99%
“…A formalisation of attack-defence trees similar to the one we used has been presented by Aslanyan and Nielson [9], where they proposed evaluation techniques for analysing trees with multiple conflicting parameters in terms of Pareto efficiency. Further developments on attack-defence trees have been carried out, such as combining the tree methodology with Bayesian networks for analysing probabilistic measures of attack-defence trees with dependent actions [19] and studying the relationship between such trees and binary zero-sum two-player games [11]. Moreover, Bistarelli et al [26] used strategic games for analysing attack-defence scenarios presented with defence trees, an extension of attack trees with countermeasures only on the leaves.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, attack trees have been enriched and augmented with adaptable countermeasures to become ADTrees [10]. Performing quantitative analysis on these models usually goes through applying an analytic approach such as Markov chains [1-3, 12, 15], Petri-Nets [5,16], or Bayesian networks [11].…”
Section: Introductionmentioning
confidence: 99%
“…Kordy el al. [11] adopted ADTrees model and used Bayesian networks approach to assess the likelihood of security scenarios. This approach requires for each instant of time the construction of a conditional probability table for each action because of the stochastic dependency between actions.…”
Section: Introductionmentioning
confidence: 99%