OWA trees and their role in security modeling using attack trees

We introduce the idea of an OWA node as an extension of the ''and/or'' node and use them to generalize ''and/or'' trees to OWA trees. We provide a semantics for an OWA node. Specifically while an ''or'' node requires only one of the children to be satisfied and an ''and'' node requires ''all'' the children be satisfied the OWA node allows us to model situations in which there is some probabilistic uncertainty in the number of children that need be satisfied. We then use these OWA nodes in the security related problem of constructing attack trees. Techniques for the evaluation of an OWA attack tree for the overall probability of success and cost of an attack are provided. A method is provided for describing different types of attackers.

[1]  Bernard De Baets,et al.  Bell-type inequalities for quasi-copulas , 2004, Fuzzy Sets Syst..

[2]  J. Kacprzyk,et al.  The Ordered Weighted Averaging Operators: Theory and Applications , 1997 .

[3]  Ronald R. Yager,et al.  Fuzzy logic methods in recommender systems , 2003, Fuzzy Sets Syst..

[4]  Ronald R. Yager,et al.  Extending multicriteria decision making by mixing t‐norms and OWA operators , 2005, Int. J. Intell. Syst..

[5]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[6]  Dimitar Filev,et al.  Induced ordered weighted averaging operators , 1999, IEEE Trans. Syst. Man Cybern. Part B.

[7]  Ronald R. Yager,et al.  Induced aggregation operators , 2003, Fuzzy Sets Syst..

[8]  Tomas Olovsson,et al.  A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..

[9]  Ronald R. Yager,et al.  Heavy OWA Operators , 2002, Fuzzy Optim. Decis. Mak..

[10]  R. Nelsen An Introduction to Copulas , 1998 .

[11]  R. Yager Families of OWA operators , 1993 .

[12]  Ken Frazer,et al.  Building secure software: how to avoid security problems the right way , 2002, SOEN.

[13]  H. B. Mitchell,et al.  A Modified OWA Operator and its Use in Lossless DPCM Image Compression , 1997, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[14]  L. Zadeh A COMPUTATIONAL APPROACH TO FUZZY QUANTIFIERS IN NATURAL LANGUAGES , 1983 .

[15]  Oleg Sheyner,et al.  Attack scenario graphs for computer network threat analysis and prediction , 2003, Complex.

[16]  R. Yager Extending multicriteria decision making by mixing t-norms and OWA operators: Research Articles , 2005 .

[17]  Kishor S. Trivedi,et al.  Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[18]  Andrew P. Moore,et al.  Attack Modeling for Information Security and Survivability , 2001 .

[19]  M. J. Frank On the simultaneous associativity ofF(x,y) andx +y -F(x,y) , 1979 .

[20]  M. Sklar Fonctions de repartition a n dimensions et leurs marges , 1959 .

[21]  Ronald R. Yager,et al.  On ordered weighted averaging aggregation operators in multicriteria decisionmaking , 1988, IEEE Trans. Syst. Man Cybern..

[22]  R. Yager Quantifier guided aggregation using OWA operators , 1996, Int. J. Intell. Syst..