2017
DOI: 10.3233/fi-2017-1531
|View full text |Cite
|
Sign up to set email alerts
|

Semantics for Specialising Attack Trees based on Linear Logic

Abstract: Attack trees profile the sub-goals of the proponent of an attack. Attack trees have a variety of semantics depending on the kind of question posed about the attack, where questions are captured by an attribute domain. We observe that one of the most general semantics for attack trees, the multiset semantics, coincides with a semantics expressed using linear logic propositions. The semantics can be used to compare attack trees to determine whether one attack tree is a specialisation of another attack tree. Buil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(35 citation statements)
references
References 20 publications
0
35
0
Order By: Relevance
“…The article [4] contains a case study and guidelines for practical application of the bottom-up procedure. Numerous examples of attributes for attack trees and attack trees extended with additional sequential refinement have been given in [13,15]. We gather some relevant attribute domains for attackdefense trees in Table 1.…”
Section: Definition 4 Letmentioning
confidence: 99%
See 1 more Smart Citation
“…The article [4] contains a case study and guidelines for practical application of the bottom-up procedure. Numerous examples of attributes for attack trees and attack trees extended with additional sequential refinement have been given in [13,15]. We gather some relevant attribute domains for attackdefense trees in Table 1.…”
Section: Definition 4 Letmentioning
confidence: 99%
“…This difficulty is sometimes recognized, e.g., in [2,21], where authors explicitly assume lack of repeated labels in order for their methods to be valid. In some works the problem is avoided (or overlooked) by interpretation of repeated labels as distinct instances of the same goal, thus, de facto as distinct goals (e.g., [8,13,18,22]), or by distinguishing between the repetitions occurring in specific subtrees of a tree, as in [3]. Recently, Bossuat and Kordy have established a classification of repeated labels in attackdefense trees, depending on whether the corresponding nodes represent exactly the same instance or different instances of a goal [5].…”
Section: Introductionmentioning
confidence: 99%
“…Since 1999, numerous extensions of attack trees have been proposed. They augment the original model with additional refinement operators [27,25,7] or support not only offensive but also defensive behaviour [9,30,35]. An exhaustive overview of the existing attack tree-based models can be found in [31].…”
Section: Introductionmentioning
confidence: 99%
“…Sometimes the environment is the defender, but external choice may model uncertainty inherent in the environment the attacker operates. The semantics of external choices becomes particularly interesting when considering the notion of "specialisation" [25] introduced for comparing attack trees that are not necessarily equivalent. This paper introduces several semantics for attack trees: a minimal extension of the standard multiset semantics [33]; a novel game semantics [29,3,16]; and semantics based on linear logic [21].…”
Section: Introductionmentioning
confidence: 99%
“…In order to use any modeling framework in practice, formal foundations are necessary. Previous research on formalization of attack trees focused mainly on mathematical semantics for attack tree-based models [19,13,14,12,10], and various algorithms for their quantitative analysis [25,16,1]. However, all these formalizations rely on an action-based approach, where the attacker's goals represented by the labels of the attack tree nodes are expressed using actions that the attacker needs to perform to achieve his/her objective.…”
Section: Introductionmentioning
confidence: 99%