2015
DOI: 10.1016/j.entcs.2014.12.014
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Bayesian Networks for the Analysis of Combined Attack Trees

Abstract: The growing need to find proper countermeasures able to protect critical infrastructures from threats has addressed the definition of quantitative methodologies for risk assessment. One of the most difficult aspects in this topic is the evaluation of the effects of attacks. Attacks Trees represent one of the most used formalisms in the modeling of attack scenarios: notwithstanding some extensions have been proposed to enrich the expressiveness of the original formalism, some effort should be spent on their ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…A Bayesian network approach for ATs is explored in [8]. The authors proposed a methodology that translates ATs into Bayesian Networks.…”
Section: Attack Trees and Related Workmentioning
confidence: 99%
“…A Bayesian network approach for ATs is explored in [8]. The authors proposed a methodology that translates ATs into Bayesian Networks.…”
Section: Attack Trees and Related Workmentioning
confidence: 99%
“…A large number of AT analysis frameworks have been developed, based on lattice theory [18], timed automata [11,21,23], I/O-IMCs [3,22], Bayesian networks [13], Petri nets [8], stochastic games [4,15], etc. We refer to [20] for an overview of AT formalisms.…”
Section: Related Workmentioning
confidence: 99%
“…Systematic model transformations. Many AT analysis methods are based on converting the AT into a mathematical model that can be analyzed with existing formal techniques, such as timed automata [11,23], Bayesian networks [13], Petri nets [8], etc. An important contribution of our work is to make these translations more systematic, and therefore more extensible, maintainable, reusable, and less error-prone.…”
Section: Introductionmentioning
confidence: 99%
“…Identify threats: Possible threats to the system that could lead to vulnerabilities were characterized as high, medium, or low. Informed by expert opinion, the developer’s past experience, and industry trends and standards, we focused on identifying anticipated threats rather than every possible threat, as the latter could have been overwhelming and unrealistic to accomplish ( Gribaudo, Iacono, & Marrone, 2015 ; Oyelami & Ithnin, 2015 ). We used this process to decide which aspects of P&S were worth protecting.…”
Section: Developing a Privacy And Security Checklist For A Multi-usermentioning
confidence: 99%