Skip to main content
Top
Published in: International Journal on Software Tools for Technology Transfer 1/2021

07-01-2021 | Foundation for Mastering Change

ADTLang: a programming language approach to attack defense trees

Authors: René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Peter Gjøl Jensen, Danny Bøgsted Poulsen

Published in: International Journal on Software Tools for Technology Transfer | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Attack Defense Tree framework was developed to facilitate abstract reasoning about security issues of complex systems. As such, a zoo of techniques and extensions have emerged in an attempt to extend the simple Boolean logic of Attack Defense Trees with behavioral properties and quantities. In this paper we expand the modeling power of Attack Defense Trees by introducing a notion of temporal dependencies between attacks, forcing specific ordering of event in successful attacks. Importantly, we introduce a notion of policy for the defender, facilitating a pseudo-active defender, mechanically reacting to the choices of an attacker. To easen the use of Attack Defense Trees we introduce a domain specific language (DSL) and an accompanying tool. The introduction of the DSL facilitates reuse, modularity, collaborative tree construction and separation of logical properties and quantitative/behavioral elements. The usefulness of our framework is exhibited on a small running example, utilizing the policy-notion to implement a reactive Break The Glass policy. We note that all the implemented analysis techniques use well established tools from the formal methods community to produce the given results, relying on non-trivial and automatic translation to and from the target formalisms. Lastly we present our Open Source prototype-tool, capable of conducting various analysis and visualizing the results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Or most non-deterministic
 
Literature
1.
go back to reference Alur, R., Dill, D. L.: Automata for modeling real-time systems. In Paterson, M., editor, ICALP, volume 443 of Lecture Notes in Computer Science, pp. 322–335. Springer (1990). ISBN 3-540-52826-1 Alur, R., Dill, D. L.: Automata for modeling real-time systems. In Paterson, M., editor, ICALP, volume 443 of Lecture Notes in Computer Science, pp. 322–335. Springer (1990). ISBN 3-540-52826-1
3.
go back to reference Aslanyan, Z., Nielson, F., Parker, D.: Quantitative verification and synthesis of attack-defence scenarios. In IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27–July 1, 2016, pp. 105–119. IEEE Computer Society (2016). https://doi.org/10.1109/CSF.2016.15 Aslanyan, Z., Nielson, F., Parker, D.: Quantitative verification and synthesis of attack-defence scenarios. In IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27–July 1, 2016, pp. 105–119. IEEE Computer Society (2016). https://​doi.​org/​10.​1109/​CSF.​2016.​15
6.
go back to reference Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., Poulsen, D. B.: Modelling attack-defense trees using timed automata. In: Fränzle, M., Markey, N. (eds.) Formal Modeling and Analysis of Timed Systems—14th International Conference, FORMATS 2016, Quebec, QC, Canada, August 24–26, 2016, Proceedings, volume 9884 of Lecture Notes in Computer Science, pp. 35–50. Springer, https://doi.org/10.1007/978-3-319-44878-7_3. ISBN 978-3-319-44877-0 Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., Poulsen, D. B.: Modelling attack-defense trees using timed automata. In: Fränzle, M., Markey, N. (eds.) Formal Modeling and Analysis of Timed Systems—14th International Conference, FORMATS 2016, Quebec, QC, Canada, August 24–26, 2016, Proceedings, volume 9884 of Lecture Notes in Computer Science, pp. 35–50. Springer, https://​doi.​org/​10.​1007/​978-3-319-44878-7_​3. ISBN 978-3-319-44877-0
8.
go back to reference Hermanns, H., Krämer, J., Krčál, J., Stoelinga, M.: The value of attack-defence diagrams. In: Piessens, F., Viganò, L. (eds.) Principles of Security and Trust. POST 2016. Lecture Notes in Computer Science, vol, 9635, pp. 163–185. Springer, Berlin, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49635-0_9 Hermanns, H., Krämer, J., Krčál, J., Stoelinga, M.: The value of attack-defence diagrams. In: Piessens, F., Viganò, L. (eds.) Principles of Security and Trust. POST 2016. Lecture Notes in Computer Science, vol, 9635, pp. 163–185. Springer, Berlin, Heidelberg (2016). https://​doi.​org/​10.​1007/​978-3-662-49635-0_​9
9.
go back to reference Johnson, Pontus, Lagerström, Robert, Ekstedt, Mathias: A meta language for threat modeling and attack simulations. In: Doerr, Sebastian, Fischer, Mathias, Schrittwieser, Sebastian, Herrmann, Dominik (eds.) Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, pp. 38:1–38:8. ACM, Hamburg (2018). https://doi.org/10.1145/3230833.3232799. ISBN 978-1-4503-6448-5CrossRef Johnson, Pontus, Lagerström, Robert, Ekstedt, Mathias: A meta language for threat modeling and attack simulations. In: Doerr, Sebastian, Fischer, Mathias, Schrittwieser, Sebastian, Herrmann, Dominik (eds.) Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, pp. 38:1–38:8. ACM, Hamburg (2018). https://​doi.​org/​10.​1145/​3230833.​3232799. ISBN 978-1-4503-6448-5CrossRef
10.
go back to reference Kordy, Barbara, Mauw, Sjouke, Radomirović, Saša, Schweitzer, Patrick: Attack-defense trees. J. Logic Comput. 24(1), 55–87 (2014)MathSciNetCrossRef Kordy, Barbara, Mauw, Sjouke, Radomirović, Saša, Schweitzer, Patrick: Attack-defense trees. J. Logic Comput. 24(1), 55–87 (2014)MathSciNetCrossRef
11.
go back to reference Kumar, Rajesh, Rensink, Arend, Stoelinga, Mariëlle: LOCKS: a property specification language for security goals. In: Haddad, M.Hisham, Wainwright, L.Roger, Chbeir, Richard (eds.) Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp. 1907–1915. ACM, Pau (2018). https://doi.org/10.1145/3167132.3167336CrossRef Kumar, Rajesh, Rensink, Arend, Stoelinga, Mariëlle: LOCKS: a property specification language for security goals. In: Haddad, M.Hisham, Wainwright, L.Roger, Chbeir, Richard (eds.) Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp. 1907–1915. ACM, Pau (2018). https://​doi.​org/​10.​1145/​3167132.​3167336CrossRef
13.
go back to reference Liu, P., Mauw, S., Stølen, K. (eds) Graphical Models for Security—4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers Liu, P., Mauw, S., Stølen, K. (eds) Graphical Models for Security—4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers
14.
go back to reference Schneier, B.: Attack trees. Dr. Dobb’s J. Softw. Tools 24(12), 21–22, 24, 26, 28–29 (1999) Schneier, B.: Attack trees. Dr. Dobb’s J. Softw. Tools 24(12), 21–22, 24, 26, 28–29 (1999)
15.
go back to reference Younes, L.S.Håkan: Verification and Planning for Stochastic Processes with Asynchronous Events. PhD thesis. Carnegie Mellon University, Pittsburgh (2005) Younes, L.S.Håkan: Verification and Planning for Stochastic Processes with Asynchronous Events. PhD thesis. Carnegie Mellon University, Pittsburgh (2005)
Metadata
Title
ADTLang: a programming language approach to attack defense trees
Authors
René Rydhof Hansen
Kim Guldstrand Larsen
Axel Legay
Peter Gjøl Jensen
Danny Bøgsted Poulsen
Publication date
07-01-2021
Publisher
Springer Berlin Heidelberg
Published in
International Journal on Software Tools for Technology Transfer / Issue 1/2021
Print ISSN: 1433-2779
Electronic ISSN: 1433-2787
DOI
https://doi.org/10.1007/s10009-020-00593-w

Other articles of this Issue 1/2021

International Journal on Software Tools for Technology Transfer 1/2021 Go to the issue

Premium Partner