2012
DOI: 10.1093/logcom/exs029
|View full text |Cite
|
Sign up to set email alerts
|

Attack-defense trees

Abstract: Attack-defense trees are a novel methodology for graphical security modeling and assessment. They extend the well known formalism of attack trees by allowing nodes that represent defensive measures to appear at any level of the tree. This enlarges the modeling capabilities of attack trees and makes the new formalism suitable for representing interactions between an attacker and a defender. Our formalization supports different semantical approaches for which we provide usage scenarios. We also formalize how to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
196
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 147 publications
(198 citation statements)
references
References 13 publications
2
196
0
Order By: Relevance
“…As mentioned above, it would be interesting to take the role of an actor into account. We are also investigating how to extend our approach to attack-defence trees [18], which combine actions by attackers with mitigating actions by defenders.…”
Section: Resultsmentioning
confidence: 99%
“…As mentioned above, it would be interesting to take the role of an actor into account. We are also investigating how to extend our approach to attack-defence trees [18], which combine actions by attackers with mitigating actions by defenders.…”
Section: Resultsmentioning
confidence: 99%
“…Attack-defense trees have been provided with a multiset semantics [16], that, as for attack trees, coincides with the positive propositions in linear logic. Thus the multiset semantics for attack-defense trees can be captured using linear logic.…”
Section: Future Workmentioning
confidence: 99%
“…components or services) and design decisions collectively constitute to SRA quality, traditional architecture analysis and evaluation methods such as utility tree [17] from ATAM are not sufficient because these are unable to quantify architecture quality. We advocate for leveraging an new approach inspired from attack-defense trees [19] to enhance the utility tree for analysis of the completeness of a SRA. Fig.…”
Section: Evaluating a Reference Architecturementioning
confidence: 99%