Reference Hub40
Attribute Decoration of Attack–Defense Trees

Attribute Decoration of Attack–Defense Trees

Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer
Copyright: © 2012 |Volume: 3 |Issue: 2 |Pages: 35
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466613980|DOI: 10.4018/jsse.2012040101
Cite Article Cite Article

MLA

Bagnato, Alessandra, et al. "Attribute Decoration of Attack–Defense Trees." IJSSE vol.3, no.2 2012: pp.1-35. http://doi.org/10.4018/jsse.2012040101

APA

Bagnato, A., Kordy, B., Meland, P. H., & Schweitzer, P. (2012). Attribute Decoration of Attack–Defense Trees. International Journal of Secure Software Engineering (IJSSE), 3(2), 1-35. http://doi.org/10.4018/jsse.2012040101

Chicago

Bagnato, Alessandra, et al. "Attribute Decoration of Attack–Defense Trees," International Journal of Secure Software Engineering (IJSSE) 3, no.2: 1-35. http://doi.org/10.4018/jsse.2012040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Attack–defense trees can be used as part of threat and risk analysis for system development and maintenance. They are an extension of attack trees with defense measures. Moreover, tree nodes can be decorated with attributes, such as probability, impact, and penalty, to increase the expressiveness of the model. Attribute values are typically assigned based on cognitive estimations and historically recorded events. This paper presents a practical case study with attack–defense trees. First, the authors create an attack–defense tree for an RFID-based goods management system for a warehouse. Then, they explore how to use a rich set of attributes for attack and defense nodes and assign and aggregate values to obtain condensed information, such as performance indicators or other key security figures. The authors discuss different modeling choices and tradeoffs. The case study led them to define concrete guidelines that can be used by software developers, security analysts, and system owners when performing similar assessments.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.