首页> 外文会议>International Conference on Formal Engineering Methods >Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems
【24h】

Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems

机译:黑客与安全性:攻击 - 防御树作为异步多功能系统

获取原文

摘要

Attack-Defence Trees (ADTrees) are a well-suited formalism to assess possible attacks to systems and the efficiency of counter-measures. This paper extends the available ADTree constructs with reactive patterns that cover further security scenarios, and equips all constructs with attributes such as time and cost to allow for quantitative analyses. We model ADTrees as (an extension of) Asynchronous Multi-Agents Systems: EAMAS. The ADTree-EAMAS transformation allows us to quantify the impact of different agents configurations on metrics such as attack time. Using EAMAS also permits parametric verification: we derive constraints for property satisfaction, e.g. the maximum time a defence can take to block an attack. Our approach is exercised on several case studies using the Uppaal and IMITATOR tools. We developed the open-source tool adt2amas implementing our transformation.
机译:攻击 - 防御树(Adtree)是一个非常适合的形式主义,以评估对系统的可能攻击和反措施的效率。 本文将可用的Adtree构造扩展了具有覆盖进一步安全方案的无功图案,并将所有构造配备有时间和成本的属性,以允许定量分析。 我们模拟了AdtreeS(扩展)异步多代理系统:OAMAS。 Adtree-EAMAS转换允许我们量化不同代理配置对攻击时间等度量的影响。 使用EAMAS还允许参数验证:我们推导出属性满意度的约束,例如, 防御可以采取的最长时间来阻止攻击。 我们的方法是使用UPPAAL和IMITATOR工具的几种案例研究行使。 我们开发了实施我们转型的开源工具Adt2amas。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号