A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions that allow the identification and/or prediction of potential cyber attacks, and deploy defenses to face them. In this paper, we propose a framework that incorporates Attack-Defense trees (ADTrees) and Continuous Time Markov Chains (CTMCs) to systematically represent attacks, defenses, and their interaction. This solution allows to perform quantitative security assessment, with an aim to predict and/or identify attacks and find the best and appropriate defenses to reduce the impact of attacks.

[1]  Bharat B. Madan,et al.  Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.

[2]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[3]  Barbara Kordy,et al.  ADTool: Security Analysis with Attack- Defense Trees (Extended Version) , 2013, ArXiv.

[4]  Barbara Kordy,et al.  Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.

[5]  William J. Stewart,et al.  Introduction to the numerical solution of Markov Chains , 1994 .

[6]  Ludovic Piètre-Cambacédès,et al.  Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP) , 2010, 2010 European Dependable Computing Conference.

[7]  Oleg Sheyner,et al.  Attack scenario graphs for computer network threat analysis and prediction , 2003, Complex.

[8]  Suku Nair,et al.  Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification , 2014, NETCOM 2014.

[9]  Rajesh Kumar,et al.  Sequential and Parallel Attack Tree Modelling , 2015, SAFECOMP Workshops.

[10]  Barbara Kordy,et al.  ADTool: Security Analysis with Attack-Defense Trees , 2013, QEST.

[11]  Reza Pulungan,et al.  Time-Dependent Analysis of Attacks , 2014, POST.

[12]  G. Manimaran,et al.  PENET: A practical method and tool for integrated modeling of security attacks and countermeasures , 2009, Comput. Secur..

[13]  Barbara Kordy,et al.  A Probabilistic Framework for Security Scenarios with Dependent Actions , 2014, IFM.

[14]  Alessandra Bagnato,et al.  Attribute Decoration of Attack-Defense Trees , 2012, Int. J. Secur. Softw. Eng..

[15]  R.F. Mills,et al.  Analyzing Attack Trees using Generalized Stochastic Petri Nets , 2006, 2006 IEEE Information Assurance Workshop.

[16]  Barbara Kordy,et al.  Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent , 2010, GameSec.

[17]  Dong Seong Kim,et al.  Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.

[18]  Olga Gadyatskaya,et al.  Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 , 2016, QEST.