Skip to main content
Top

2018 | OriginalPaper | Chapter

An Extension of Attack Trees

Authors : Yi-Chih Kao, Yuan-Ping Hwang, Shih-Chen Wang, Sheng-Lung Peng

Published in: Security with Intelligent Computing and Big-data Services

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attack trees provide a model to describe the security of a system based on the possibility of various attacks. In this paper, we propose the concept of “attack graphs” as an extension of attack trees, wherein directed acyclic graphs are used to depict possible attacks on a system. By deploying this model, system managers can discern all possible threats to the system and thus are more likely to design efficient countermeasures to thwart those attacks. Within this model, we also propose the concept of the most dangerous path in the attack graph, and finally propose an algorithm to expose it.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999) Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
2.
go back to reference Odubiyi, J.B., O’Brien, C.W.: Information security attack tree modeling. In: Proceedings of Seventh Workshop on Education in Computer Security (WECS), pp. 29–37 (2006) Odubiyi, J.B., O’Brien, C.W.: Information security attack tree modeling. In: Proceedings of Seventh Workshop on Education in Computer Security (WECS), pp. 29–37 (2006)
3.
go back to reference Shooman, M.L.: Probabilistic Reliability: An Engineering Approach. McGraw-Hill Book Company, New York (1968)MATH Shooman, M.L.: Probabilistic Reliability: An Engineering Approach. McGraw-Hill Book Company, New York (1968)MATH
4.
go back to reference Anderson, R.: Why cryptosystems fail. In: Proceedings of the 1st ACM Conference on Computer and Communications Security (1993) Anderson, R.: Why cryptosystems fail. In: Proceedings of the 1st ACM Conference on Computer and Communications Security (1993)
7.
go back to reference Ray, H.T., Vemuri, R., Kantubhukta, H.R.: Toward an automated attack model for red teams. IEEE Secur. Priv. 3(4), 18–24 (2005)CrossRef Ray, H.T., Vemuri, R., Kantubhukta, H.R.: Toward an automated attack model for red teams. IEEE Secur. Priv. 3(4), 18–24 (2005)CrossRef
8.
go back to reference Horowitz, E., Sahni, S., Mehta, D.P.: Fundamentals of Data Structures in C++, 2nd edn. Silicon Press, New York (2007) Horowitz, E., Sahni, S., Mehta, D.P.: Fundamentals of Data Structures in C++, 2nd edn. Silicon Press, New York (2007)
9.
go back to reference Weiss, M.A.: Data Structures and Algorithm Analysis in C, 3rd edn. (2007) Weiss, M.A.: Data Structures and Algorithm Analysis in C, 3rd edn. (2007)
10.
11.
go back to reference West, D.B.: Introduction to Graph Theory. Prentic-Hall Inc., Upper Saddle River (2001) West, D.B.: Introduction to Graph Theory. Prentic-Hall Inc., Upper Saddle River (2001)
12.
Metadata
Title
An Extension of Attack Trees
Authors
Yi-Chih Kao
Yuan-Ping Hwang
Shih-Chen Wang
Sheng-Lung Peng
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-76451-1_8

Premium Partner