2011
DOI: 10.1007/978-3-642-19751-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Foundations of Attack–Defense Trees

Abstract: Abstract. We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical approaches. We present several semantics for attack-defense trees along with usage scenarios, and we show how to evaluate attributes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
175
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 188 publications
(178 citation statements)
references
References 13 publications
3
175
0
Order By: Relevance
“…To understand the attacker's progress and find the attack path to the attacker's target, there are two approaches to model network vulnerabilities: an attack graph [12], [13] and an attack tree [14], [15]. They provide an appropriate picture of different ways for compromising a target by exploiting a sequence of vulnerabilities.…”
Section: Attack-defense Treementioning
confidence: 99%
“…To understand the attacker's progress and find the attack path to the attacker's target, there are two approaches to model network vulnerabilities: an attack graph [12], [13] and an attack tree [14], [15]. They provide an appropriate picture of different ways for compromising a target by exploiting a sequence of vulnerabilities.…”
Section: Attack-defense Treementioning
confidence: 99%
“…Attack and Protection trees, Defense Trees and AttackDefense trees were a few of the models built upon the regular attack tree and used to analyze attacks from both an attacker's and a defender's point of view [46,47,48]. Edge et al built a Protection tree to identify the possible protection areas by analyzing the attack tree and calculating the impact, probability and cost of the attacker's goal.…”
Section: A General Attack Analysis Approachesmentioning
confidence: 99%
“…Similarly, the probability of the most probable attack with respect to t is P max (t) (6) = max x∈{0,1} var t ψ t (x) (12) = max…”
Section: Indicators For Probability Computationmentioning
confidence: 99%
“…Attack-defense trees [12] extend the well-known model of attack trees [26], by considering not only actions of an attacker, but also possible countermeasures of a defender. Since the augmented formalism models interactions between an attacker and a defender explicitly and is able to capture evolutionary aspects of attack-defense scenarios, it allows for a more accurate security assessment process compared to attack trees.…”
Section: Introductionmentioning
confidence: 99%