TY - GEN
T1 - Attack-Defense Trees with Offensive and Defensive Attributes
AU - Copae, Danut-Valentin
AU - Soltani, Reza
AU - Lopuhaä-Zwakenberg, Milan
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - Effective risk management in cybersecurity requires a thorough understanding of the interplay between attacker capabilities and defense strategies. Attack-Defense Trees (ADTs) are a commonly used methodology for representing this interplay; however, previous work in this domain has only focused on analyzing metrics such as cost, damage, or time from the perspective of the attacker. This approach provides an incomplete view of the system, as it neglects to model defender attributes: in real-world scenarios, defenders have finite resources for countermeasures and are similarly constrained. In this paper, we propose a novel framework that incorporates defense metrics into ADTs, and we present efficient algorithms for computing the Pareto front between defense and attack metrics. Our methods encode both attacker and defender metrics as semirings, allowing our methods to be used for many metrics such as cost, damage, and skill. We analyze tree-structured ADTs using a bottom-up approach and general ADTs by translating them into binary decision diagrams. Experiments on randomly generated ADTS demonstrate that both approaches effectively handle ADTs with several hundred nodes.
AB - Effective risk management in cybersecurity requires a thorough understanding of the interplay between attacker capabilities and defense strategies. Attack-Defense Trees (ADTs) are a commonly used methodology for representing this interplay; however, previous work in this domain has only focused on analyzing metrics such as cost, damage, or time from the perspective of the attacker. This approach provides an incomplete view of the system, as it neglects to model defender attributes: in real-world scenarios, defenders have finite resources for countermeasures and are similarly constrained. In this paper, we propose a novel framework that incorporates defense metrics into ADTs, and we present efficient algorithms for computing the Pareto front between defense and attack metrics. Our methods encode both attacker and defender metrics as semirings, allowing our methods to be used for many metrics such as cost, damage, and skill. We analyze tree-structured ADTs using a bottom-up approach and general ADTs by translating them into binary decision diagrams. Experiments on randomly generated ADTS demonstrate that both approaches effectively handle ADTs with several hundred nodes.
KW - Pareto front
KW - Attack trees
KW - Attack-defense trees
KW - Multi-criteria optimization
U2 - 10.1109/DSN64029.2025.00044
DO - 10.1109/DSN64029.2025.00044
M3 - Conference contribution
SN - 979-8-3315-1202-6
T3 - Proceedings - Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
SP - 358
EP - 370
BT - 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
A2 - Cinque, Marcello
A2 - Cotroneo, Domenico
A2 - De Simone, Luigi
A2 - Eckhart, Matthias
A2 - Lee, Patrick P.C.
A2 - Zonouz, Saman
CY - Piscataway, NJ
ER -