The Value of Attack-Defence Diagrams
نویسندگان
چکیده
Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing stateof-the-art modelling tools for attack scenarios, comprehensive considerations of these conditions have not been possible. This paper introduces Attack-Defence Diagrams as a formalism to describe intricate attackdefence scenarios that can represent the above mentioned situational conditions. A diagram’s semantics naturally corresponds to a game where its players, the attacker and the defender, compete to turn the game’s outcome from undecided into a successful attack or defence, respectively. Attack-Defence Diagrams incorporate aspects of time, probability, and cost, so as to reflect timing of attack steps and countermeasures, their success chances, as well as skills and knowledge of the attacker and defender that may increase over time with lessons learned from previous attack steps. The semantics maps on stochastic timed automata as the underlying mathematical model in a compositional manner. This enables an efficient what-if quantitative evaluation to deliver cost and success estimates, as we demonstrate by a case study from the cybersecurity domain.
منابع مشابه
Robust Networks
Connections between individuals facilitate the exchange of goods, resources and information and create benefits. However, these connections may be exploited by intelligent adversaries to spread their attacks as well. Links thus create value but also enable the spread of attacks which are harmful. How does this tension in the role of links shape network architecture and the nature of conflict? W...
متن کاملClinical Predictors of Intensive Care Unit Admission for Asthmatic Children
IntroductionChildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. Asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which ar...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA Knowledge Expression Method of Scada Network Attack and Defence Based on Factor State Space
To solve the problem of knowledge expression in SCADA network attack and defence system, a new knowledge expression method of SCADA network attack and defence based on factor state space is presented. Combined with factor space definition and the formal description of factor state space expression and analyzing attack factors, skill and attack aim, analysis and expression method of network atta...
متن کاملHow to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the detected threats. However, the existing socio-technical models are too abstract to represent all security controls recommended by practitioners...
متن کامل