Abstract:Abstract-System security continues to be of increasing importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat scenarios. Simply listing the threats and devising countermeasures for each is ineffective and not efficient. We describe a threat cataloging methodology whereby a large number of threats can be efficiently cataloged and analyzed for common fe… Show more
“…The identified parameters are then stored in the MDD data structure as edge value annotations. Using a piecewise polynomial approximation, we can analyze multi-state systems similarly to the previous MDD-based analysis methods [5] [8] [6] [7] that use a single value for each probability. Instead of a single value, we assign a polynomial to each edge of an MDD, as shown in Fig.…”
Section: Curve-fitting Methodsmentioning
confidence: 99%
“…This concept is used for disastertolerance analysis in [3] where a mark-up language, CyTML, represents cyber-threat trees and a companion parser converts the CyTML into a corresponding MDD with edge annotations. The cyber-threat tree approach is generalized for application to other analysis tasks in [5]. The work in [6] extends that of [5] by using an Edge-Valued MDD (EVMDD) software to provide additional experimental results and analysis of the computational memory resource requirements.…”
Section: Introductionmentioning
confidence: 99%
“…The cyber-threat tree approach is generalized for application to other analysis tasks in [5]. The work in [6] extends that of [5] by using an Edge-Valued MDD (EVMDD) software to provide additional experimental results and analysis of the computational memory resource requirements. New algorithms to minimize the number of edges in the EVMDDs are reported in [7].…”
“…The identified parameters are then stored in the MDD data structure as edge value annotations. Using a piecewise polynomial approximation, we can analyze multi-state systems similarly to the previous MDD-based analysis methods [5] [8] [6] [7] that use a single value for each probability. Instead of a single value, we assign a polynomial to each edge of an MDD, as shown in Fig.…”
Section: Curve-fitting Methodsmentioning
confidence: 99%
“…This concept is used for disastertolerance analysis in [3] where a mark-up language, CyTML, represents cyber-threat trees and a companion parser converts the CyTML into a corresponding MDD with edge annotations. The cyber-threat tree approach is generalized for application to other analysis tasks in [5]. The work in [6] extends that of [5] by using an Edge-Valued MDD (EVMDD) software to provide additional experimental results and analysis of the computational memory resource requirements.…”
Section: Introductionmentioning
confidence: 99%
“…The cyber-threat tree approach is generalized for application to other analysis tasks in [5]. The work in [6] extends that of [5] by using an Edge-Valued MDD (EVMDD) software to provide additional experimental results and analysis of the computational memory resource requirements. New algorithms to minimize the number of edges in the EVMDDs are reported in [7].…”
“…For fast assessment of the state probabilities, many methods based on binary decision diagrams (BDDs) [2]- [4], [6], [23] and multi-valued decision diagrams (MDDs) [10], [13], [20]- [22] have been proposed, and they have attracted much attention in recent years. Especially, MDD based methods hold promise, as [17] showed that an MDD based method is more efficient than a BDD based one.…”
Abstract-This paper proposes a new reduction rule for edge-valued multi-valued decision diagrams (EVMDDs), which improves the speed of analysis of multi-state systems (MSSs). Existing reduction rules for decision diagrams remove redundant nodes, while the proposed rule removes redundant edges in EVMDDs. Since the time to do an analysis in an MSS depends on the number of edges in the EVMDD, the proposed rule is faster especially when used with edge minimization algorithms based on variable grouping. Experimental results show that the proposed rule reduces the number of edges by up to 30%, and this results in an analysis time that is reduced by up to 30%.
“…We have also applied multiple-valued logic decision diagrams to threat trees to determine large-scale system threat probabilities [10]. Our initial approach assumed that system components operated independently.…”
Abstract-Design for medical system reliability has become an area of increasing importance. Medical system threats, which include system failures as well as malicious attacks, often have interdependent events that can adversely affect system operation.To address these problems, we build upon our previous threat cataloging methodology such that a large number of interdependent threats can be efficiently cataloged and analyzed for common features. Our approach utilizes Multiple-Valued Logic for describing the state of a large system and a multiplevalued decision diagram (MDD) for the threat catalog and analysis.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.