2015
DOI: 10.1007/978-3-662-46666-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Pareto Efficient Solutions of Attack-Defence Trees

Abstract: Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-op… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
59
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(60 citation statements)
references
References 24 publications
1
59
0
Order By: Relevance
“…An essential next step in risk assessment is to valuate the risk and impact of an attack, for example, by annotating the attack model with metrics and performing analyses on them [13]. This mapping can be achieved by associating the elements' identifiers with relevant metrics.…”
Section: Graphical System Modelsmentioning
confidence: 99%
“…An essential next step in risk assessment is to valuate the risk and impact of an attack, for example, by annotating the attack model with metrics and performing analyses on them [13]. This mapping can be achieved by associating the elements' identifiers with relevant metrics.…”
Section: Graphical System Modelsmentioning
confidence: 99%
“…Properties of interest [13] of these attacks include required resources, such as time or money, likelihood of success, or impact of the attack based on annotations of the leaf nodes in attack trees. Analyses [14] also identify the Pareto frontier of incomparable properties, for example, the likelihood of success of an attack, and the required budget.…”
Section: Evaluating Attack Modelsmentioning
confidence: 99%
“…For the visualisation described in this article the mapping of leaf nodes to metrics and the analyses performed are irrelevant; we assume an attack tree and a mapping from its nodes to an analysis result. For the purpose of this work we have implemented simplified versions of [13,14].…”
Section: Evaluating Attack Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Attack-defense trees are a notable extension of attack trees that include, besides attacker's actions, also defender's actions and model their interplay [3,15]. This extended formalism allows capturing more detailed scenarios, and incorporating the defender's perspective into an analysis.…”
Section: Introductionmentioning
confidence: 99%