Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, the cheapest, or the most damaging one. paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For each class, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack tree semantics. We also analyse the computational complexity of our methods.

Efficient Algorithms for Quantitative Attack Tree Analysis / Budde, Carlos E.; Stoelinga, Mariëlle. - ELETTRONICO. - (2021), pp. 1-15. (Intervento presentato al convegno CSF 2021: 34th IEEE Computer Security Foundations Symposium tenutosi a Online nel 21-25 June 2021) [10.1109/CSF51468.2021.00041].

Efficient Algorithms for Quantitative Attack Tree Analysis

Carlos E. Budde;
2021-01-01

Abstract

Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, the cheapest, or the most damaging one. paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For each class, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack tree semantics. We also analyse the computational complexity of our methods.
2021
CSF 2021: Proceedings of the 34th IEEE Computer Security Foundations Symposium
Piscataway, NJ USA
IEEE Computer Society
978-1-7281-7607-9
Budde, Carlos E.; Stoelinga, Mariëlle
Efficient Algorithms for Quantitative Attack Tree Analysis / Budde, Carlos E.; Stoelinga, Mariëlle. - ELETTRONICO. - (2021), pp. 1-15. (Intervento presentato al convegno CSF 2021: 34th IEEE Computer Security Foundations Symposium tenutosi a Online nel 21-25 June 2021) [10.1109/CSF51468.2021.00041].
File in questo prodotto:
File Dimensione Formato  
CSF21_camera_ready.pdf

Solo gestori archivio

Descrizione: Article camera-ready
Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 881.49 kB
Formato Adobe PDF
881.49 kB Adobe PDF   Visualizza/Apri
2105.07511 (1).pdf

accesso aperto

Tipologia: Pre-print non referato (Non-refereed preprint)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.15 MB
Formato Adobe PDF
1.15 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/314737
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 7
  • ???jsp.display-item.citation.isi??? 6
social impact