2015
DOI: 10.1007/978-3-319-17016-9_13
|View full text |Cite
|
Sign up to set email alerts
|

Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

Abstract: Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in existing formalisms, such properties are considered independent. For example, investing more in an attack step would not increase the probability of success. As this seems counterintuitive, we introduce a framework… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 12 publications
(23 reference statements)
0
8
0
Order By: Relevance
“…These effort has been further extended by other researchers in different contexts, e.g. by LeMay et al [258], and by Pieters and Davarynejad [259].…”
Section: Attack Modellingmentioning
confidence: 89%
See 1 more Smart Citation
“…These effort has been further extended by other researchers in different contexts, e.g. by LeMay et al [258], and by Pieters and Davarynejad [259].…”
Section: Attack Modellingmentioning
confidence: 89%
“…Pieters and Davarynejad [259] also investigate how attacker profiles affect probabilities of success for an attack step. The authors distinguish static attacker properties (skills) and dynamic attacker properties (investment schemes).…”
Section: Attack Modellingmentioning
confidence: 99%
“…A natural way to express these relationships among harms, feared events and privacy weaknesses is through harm trees. Harm trees are akin to attack trees in computer security [4,12,14,27,28,41,43,44,45,46,53]. The use of this type of trees is not new for privacy, even if very few papers have been published on this topic.…”
Section: Rr N°8876mentioning
confidence: 99%
“…One can also consider attacker behaviour over time in order to get frequency metrics for risk analysis [17]. The similarity with economic models also means that there is quite a bit of uncertainty in the results of computations.…”
Section: The Attack Navigatormentioning
confidence: 99%