首页> 外文会议>IEEE Computer Security Foundations Symposium >Exploiting attack–defense trees to find an optimal set of countermeasures
【24h】

Exploiting attack–defense trees to find an optimal set of countermeasures

机译:利用攻击防御树找到最佳对策

获取原文

摘要

Selecting the most pertinent countermeasures to secure a system is one of the ultimate goals of risk assessment. In this context, it is important to rely on modeling methods that the security experts are already familiar with, so that the solution can be smoothly adopted within industry.We propose a full-fledged framework, relying on attack–defense trees and integer linear programming, to find an optimal set of countermeasures. We use attack–defense trees formalized with directed acyclic graphs. This enables us to conveniently reason about attacker’s actions that can contribute to several distinct attacks, and countermeasures that can block different ways of attacking. We provide a constructive way of extracting all reasonable behaviors of the two actors from such models. We then exploit this extracted information to formulate a generic solution, based on integer linear programing, to address a wide class of optimization problems. We show how to instantiate it for specific security-relevant optimization criteria. We cover deterministic and probabilistic cases. The framework has been implemented in a prototype tool, and validated in a real-life case study.
机译:选择最相关的对策来保护系统是风险评估的最终目标之一。在这种情况下,必须依靠安全专家已经熟悉的建模方法,这样该解决方案才能在行业中顺利采用。 ,以找到最佳的对策集。我们使用以有向无环图形式化的攻击防御树。这使我们能够方便地推断出可能导致多种不同攻击的攻击者行为,以及可以阻止不同攻击方式的对策。我们提供了一种从此类模型中提取两个参与者的所有合理行为的建设性方法。然后,我们利用此提取的信息来基于整数线性编程来制定通用解决方案,以解决各种优化问题。我们展示了如何针对特定于安全性的优化标准实例化它。我们介绍了确定性和概率性案例。该框架已在原型工具中实现,并在实际案例研究中得到了验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号