2015
DOI: 10.1007/978-3-319-22975-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Attack Tree Analysis via Priced Timed Automata

Abstract: The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures.This paper considers attack trees, one of the most prominent security formalisms for threat analysis. We provide an effective way to compute the resources needed for a successful attack, as well as the associated attack paths. These paths provide the optimal wa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
84
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(87 citation statements)
references
References 25 publications
3
84
0
Order By: Relevance
“…Arnold et al [23] analysed the timing of attack scenarios using continuous-time Markov chains, but do not reason about strategies; [24] used priced time automata and the Uppaal model checker to analyse attack trees, but without probabilities. More recently, [25] explored how stochastic timed automata can be used to study attack-defence scenarios where timing plays a central role.…”
Section: Related Workmentioning
confidence: 99%
“…Arnold et al [23] analysed the timing of attack scenarios using continuous-time Markov chains, but do not reason about strategies; [24] used priced time automata and the Uppaal model checker to analyse attack trees, but without probabilities. More recently, [25] explored how stochastic timed automata can be used to study attack-defence scenarios where timing plays a central role.…”
Section: Related Workmentioning
confidence: 99%
“…Attack trees have been equipped with various semantics [40,25,23] and supported by tools [2,21]. They have also been enhanced with various methods for quantitative analysis [27,4,33,5,43,10,12,36,37,35], which allow determining for a given attack tree, for example, an organisation's losses due to an attack, the probability that such an attack succeeds, or the cost of a successful attack [22].…”
Section: Introductionmentioning
confidence: 99%
“…For example, Buldas et al [6], Jürgenson and Willemson [14] introduced multi-parameter attack trees with interdependent variables; Dalton et al [7] have proposed analysing attack trees as Generalized Stochastic Petri Nets; Arnold et al [2] applied interactive Input/Output Markov Chains to enhance temporal and stochastic dependencies analysis in attack trees. Kumar et al [17] have considered priced timed automata for analysis of attack trees. This work defines a translation for each leaf node and each gate in an attack tree into a priced timed automaton.…”
Section: Introductionmentioning
confidence: 99%
“…For doing this we develop a modelling framework for expressing the temporal behaviour of the attacker with the formalism networks of timed automata. Unlike the work of [17] the attack-defense-tree is not encoded as a timed automata -instead it is encoded as a boolean formula, which the attacker wishes to become true. This encoding allows us to apply state-of-the-art model checking tools and techniques to perform fully automated analyses of the modelled system, both qualitative (boolean) analysis and quantitative (probabilistic) analysis.…”
Section: Introductionmentioning
confidence: 99%