We present the results of research of limiting adversarial budget in attack games, and, in particular, in the failure-free attack tree models presented by Buldas-Stepanenko in 2012 and improved in 2013 by Buldas and Lenin. In the previously presented models attacker’s budget was assumed to be unlimited. It is natural to assume that the adversarial budget is limited and such an assumption would allow us to model the adversarial decision making more close to the one that might happen in real life. We analyze three atomic cases – the single atomic case, the atomic AND, and the atomic OR. Even these elementary cases become quite complex, at the same time, limiting adversarial budget does not seem to provide any better or more precise results compared to the failure-free models. For the limited model analysis results to be reliable, it is required that the adversarial reward is estimated with high precision, probably not achievable by providing expert estimations for the quantitative annotations on the attack steps, such as the cost or the success probability. It is doubtful that it is reasonable to face this complexity, as the failure-free model provides reliable upper bounds, being at the same time computationally less complex.
[1]
John S. Baras,et al.
Decision and Game Theory for Security
,
2010,
Lecture Notes in Computer Science.
[2]
Jan Willemson,et al.
Computing Exact Outcomes of Multi-parameter Attack Trees
,
2008,
OTM Conferences.
[3]
Ahto Buldas,et al.
Upper Bounds for Adversaries' Utility in Attack Trees
,
2012,
GameSec.
[4]
Ahto Buldas,et al.
New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees
,
2013,
GameSec.
[5]
Seungjoo Kim,et al.
Information Security and Cryptology - ICISC 2005
,
2005,
Lecture Notes in Computer Science.
[6]
Jan Willemson,et al.
Rational Choice of Security Measures Via Multi-parameter Attack Trees
,
2006,
CRITIS.
[7]
Jan Willemson,et al.
On Fast and Approximate Attack Tree Computations
,
2010,
ISPEC.
[8]
Sjouke Mauw,et al.
Foundations of Attack Trees
,
2005,
ICISC.
[9]
Tharam S. Dillon,et al.
On the Move to Meaningful Internet Systems, OTM 2010
,
2010,
Lecture Notes in Computer Science.