A Probabilistic Framework for Security Scenarios with Dependent Actions

This work addresses the growing need of performing meaningful probabilistic analysis of security. We propose a framework that integrates the graphical security modeling technique of attack–defense trees with probabilistic information expressed in terms of Bayesian networks. This allows us to perform probabilistic evaluation of attack–defense scenarios involving dependent actions. To improve the efficiency of our computations, we make use of inference algorithms from Bayesian networks and encoding techniques from constraint reasoning. We discuss the algebraic theory underlying our framework and point out several generalizations which are possible thanks to the use of semiring theory.

[1]  Paul D. Seymour,et al.  Graph minors. I. Excluding a forest , 1983, J. Comb. Theory, Ser. B.

[2]  Frank van Harmelen,et al.  Handbook of Knowledge Representation , 2008, Handbook of Knowledge Representation.

[3]  Stefano Bistarelli,et al.  Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[4]  Barbara Kordy,et al.  Quantitative Questions on Attack-Defense Trees , 2012, ICISC.

[5]  Hans L. Bodlaender,et al.  A Partial k-Arboretum of Graphs with Bounded Treewidth , 1998, Theor. Comput. Sci..

[6]  L. Zadeh Fuzzy sets as a basis for a theory of possibility , 1999 .

[7]  Barbara Kordy,et al.  ADTool: Security Analysis with Attack-Defense Trees , 2013, QEST.

[8]  Roman Barták,et al.  Constraint Processing , 2009, Encyclopedia of Artificial Intelligence.

[9]  Daniel Kahneman,et al.  Probabilistic reasoning , 1993 .

[10]  Alessandra Bagnato,et al.  Attribute Decoration of Attack-Defense Trees , 2012, Int. J. Secur. Softw. Eng..

[11]  Daesung Kwon,et al.  Information Security and Cryptology – ICISC 2012 , 2012, Lecture Notes in Computer Science.

[12]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[13]  Barbara Kordy,et al.  Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.

[14]  Marcin Junczys-Dowmunt,et al.  SyMGiza++: Symmetrized Word Alignment Models for Statistical Machine Translation , 2011, SIIS.

[15]  Marc Pouly,et al.  Nenok - a Software Architecture for Generic Inference , 2010, Int. J. Artif. Intell. Tools.

[16]  Derek G. Corneil,et al.  Complexity of finding embeddings in a k -tree , 1987 .

[17]  Jane Hillston,et al.  PALOMA: A Process Algebra for Located Markovian Agents , 2014, QEST.

[18]  Prakash P. Shenoy,et al.  Valuation-based systems: a framework for managing uncertainty in expert systems , 1992 .

[19]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[20]  Indrajit Ray,et al.  Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.

[21]  Wenke Lee,et al.  Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.

[22]  Jürg Kohlas Information algebras - generic structures for inference , 2003, Discrete mathematics and theoretical computer science.

[23]  L. Zadeh,et al.  Fuzzy Logic for the Management of Uncertainty , 1992 .

[24]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[25]  Barbara Kordy,et al.  DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..

[26]  Barbara Kordy,et al.  Attack-defense trees , 2014, J. Log. Comput..

[27]  L. Nordstrom,et al.  Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams , 2009, IEEE Transactions on Power Delivery.

[28]  Nic Wilson,et al.  Semiring induced valuation algebras: Exact and approximate local computation algorithms , 2008, Artif. Intell..

[29]  Rina Dechter,et al.  Bucket Elimination: A Unifying Framework for Reasoning , 1999, Artif. Intell..

[30]  Judea Pearl,et al.  Chapter 2 – BAYESIAN INFERENCE , 1988 .

[31]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[32]  Marc Pouly,et al.  Generic Inference: A Unifying Theory for Automated Reasoning , 2011 .

[33]  Barbara Kordy,et al.  Computational Aspects of Attack-Defense Trees , 2011, SIIS.

[34]  Seungjoo Kim,et al.  Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.

[35]  Lingyu Wang,et al.  Measuring Network Security Using Bayesian Network-Based Attack Graphs , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.

[36]  Jan Jürjens,et al.  Verifying Cryptographic Code in C: Some Experience and the Csec Challenge , 2011, Formal Aspects in Security and Trust.

[37]  Robert Lagerström,et al.  Extended Influence Diagram Generation , 2007, IESA.