Quantitative evaluation of attack/defense scenarios through Decision Network modelling and analysis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We exploit Decision Networks (DN) for the analysis of attack/defense scenarios. DN extend both the modeling and the analysis capabilities of formalisms based on Attack Trees, which are the main reference model in such a context. In particular, DN can naturally address uncertainty at every level, including the interaction level of attacks and countermeasures, making possible the modeling of situations which are not limited to Boolean combinations of events. Furthermore, inference algorithms can be exploited for a probabilistic analysis with the goal of assessing the risk and the importance of the attacks (with respect to specific sets of countermeasures), and selecting the optimal set (with respect to a specific objective function) of countermeasures to activate.

Original languageEnglish
Title of host publicationProceedings - 2014 International Carnahan Conference on Security Technology, ICCST 2014
EditorsFabio Garzia, Fabio Garzia, Fabio Garzia, Gordon Thomas, Daniel A. Pritchard
PublisherInstitute of Electrical and Electronics Engineers Inc.
EditionOctober
ISBN (Electronic)9781479935321
DOIs
Publication statusPublished - 15 Dec 2014
Event48th Annual IEEE International Carnahan Conference on Security Technology, ICCST 2014 - Rome, Italy
Duration: 13 Oct 201416 Oct 2014

Publication series

NameProceedings - International Carnahan Conference on Security Technology
NumberOctober
Volume2014-October
ISSN (Print)1071-6572

Conference

Conference48th Annual IEEE International Carnahan Conference on Security Technology, ICCST 2014
Country/TerritoryItaly
CityRome
Period13/10/1416/10/14

Keywords

  • Attack-Defense Trees
  • Decision Networks
  • SCADA
  • importance measures
  • return on investment
  • risk

Fingerprint

Dive into the research topics of 'Quantitative evaluation of attack/defense scenarios through Decision Network modelling and analysis'. Together they form a unique fingerprint.

Cite this