2020
DOI: 10.1016/j.cose.2019.101630
|View full text |Cite
|
Sign up to set email alerts
|

Attribute evaluation on attack trees with incomplete information

Abstract: Attack trees are considered a useful tool for security modelling because they support qualitative as well as quantitative analysis. The quantitative approach is based on values associated to each node in the tree, expressing, for instance, the minimal cost or probability of an attack. Current quantitative methods for attack trees allow the analyst to, based on an initial assignment of values to the leaf nodes, derive the values of the higher nodes in the tree. In practice, however, it shows to be very difficul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 39 publications
0
10
0
3
Order By: Relevance
“…In this paper, we directly apply the defense cost, and we do not specifically consider how the defense cost is obtained. One can refer to [42,43] for details on the defense cost calculation. In practice, the defense cost refers to the actual cost of the defender in a complete attack defense scenario.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, we directly apply the defense cost, and we do not specifically consider how the defense cost is obtained. One can refer to [42,43] for details on the defense cost calculation. In practice, the defense cost refers to the actual cost of the defender in a complete attack defense scenario.…”
Section: Discussionmentioning
confidence: 99%
“…In such cases, the bottom-up computation technique is infeasible. Buldas et al [5] have recently shown that intermediary data values can be used to complete the attack tree decoration process. Our current theory of attack-tree series with attributes, including temperature functions, is agnostic to the decoration process, as it only requires that all attack trees in the time-series are decorated.…”
Section: Discussionmentioning
confidence: 99%
“…We consider attack trees constructed from leaf nodes and two types of internal nodes (AND and OR). Following, e.g., [5], we will assume that all nodes of the attack tree are labeled.…”
Section: Attack-tree Seriesmentioning
confidence: 99%
“…One important parameter in ATs used to analyse security risk is the likelihood of successful attacks (in literature, also referred to as security events). However, several probabilistic ATs [2,5,12,16,17,20] use precise values for likelihoods using the probabilistic approach. In many situations, it is difficult to elicit accurate probabilities due to lack of knowledge, or insufficient historical data, making the evaluation of risk in existing approaches unreliable.…”
Section: Introductionmentioning
confidence: 99%
“…(1) we develop a new model of ATs, called SAT, that takes second-order uncertainty into account. (2) we propose a methodology to derive opinions about security events based on the two criteria discussed in [1] using Subjective Logic. (3) we conduct an experimental evaluation that compares our approach with traditional ATs, demonstrating that the results differ and would lead to different decisions being made.…”
Section: Introductionmentioning
confidence: 99%