首页> 外文会议>Data privacy management, autonomous spontaneous security, and security assurance >Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers
【24h】

Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

机译:从攻击树计算对抗风险:控制强度和概率攻击者

获取原文
获取原文并翻译 | 示例

摘要

Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in existing formalisms, such properties are considered independent. For example, investing more in an attack step would not increase the probability of success. As this seems counterintuitive, we introduce a framework for reasoning about attack trees based on the notion of control strength, annotating nodes with a function from attacker investment to probability of success. Calculation rules on such trees are defined to enable analysis of optimal attacker investment. Our second result consists of the translation of optimal attacker investment into the associated adversarial risk, yielding what we call adversarial risk trees. The third result is the introduction of probabilistic attacker strategies, based on the fitness (utility) of available scenarios. Together these contributions improve the possibilities for using attack trees in adversarial risk analysis.
机译:攻击树是一种众所周知的形式主义,用于对网络攻击进行定量分析,包括多个步骤和替代路径。可以从各个步骤的属性中得出整体攻击的属性,例如攻击者的成本和成功的可能性。但是,在现有形式主义中,此类属性被认为是独立的。例如,对攻击步骤进行更多投资不会增加成功的可能性。由于这似乎违反直觉,因此我们引入了一种基于控制强度的概念来对攻击树进行推理的框架,以从攻击者投资到成功概率的功能来注释节点。定义了此类树的计算规则,以便能够分析最佳的攻击者投资。我们的第二个结果包括将最佳攻击者投资转换为相关的对抗风险,从而产生了所谓的对抗风险树。第三个结果是根据可用方案的适用性(实用性)引入了概率攻击者策略。这些贡献共同提高了在攻击风险分析中使用攻击树的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号