2017
DOI: 10.1007/978-3-662-54455-6_10
|View full text |Cite
|
Sign up to set email alerts
|

Model Checking Exact Cost for Attack Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…More recently, several approaches exploiting model checking techniques have been proposed to address the problem of multi-parameter quantitative evaluation on attack tree-based models. The focus of Aslanyan and Nielson in [30] is on attack trees with the exact cost and the probability parameters. Attack trees are transformed into Markov decision processes with reward structure, and erPCTL 5 queries, such as "what is the maximum probability of an attack with the cost at most c?"…”
Section: Related Workmentioning
confidence: 99%
“…More recently, several approaches exploiting model checking techniques have been proposed to address the problem of multi-parameter quantitative evaluation on attack tree-based models. The focus of Aslanyan and Nielson in [30] is on attack trees with the exact cost and the probability parameters. Attack trees are transformed into Markov decision processes with reward structure, and erPCTL 5 queries, such as "what is the maximum probability of an attack with the cost at most c?"…”
Section: Related Workmentioning
confidence: 99%
“…, ι n , γ n if this is the case, and rejects it otherwise. Notice that the computation of the set λ(ι i ) ∩ Pre * S (λ(γ i )) and λ(γ i ) ∩ Post * S (λ(ι i )) requires only polynomial time in |S| and so does the checking of inclusions in equations (2) and (3).…”
Section: Proofmentioning
confidence: 99%
“…If the tree contains branches that are irrelevant for the considered system, the time of its analysis might be longer than necessary. This implies that a manually Model checking of attack trees, especially using tools such as PRISM or UPPAAL, has already been successfully employed, in particular to support their quantitative analysis, as in [8,17,2]. Such techniques provide an effective way of handling a multiparameter evaluation of attack scenarios, e.g., identifying the resources needed for a successful attack or checking whether there exists an attack whose cost is lower than a given value and whose probability of success is greater than a certain threshold.…”
Section: Introductionmentioning
confidence: 99%