Attack-Defense Trees with Offensive and Defensive Attributes

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Downloads (Pure)

Abstract

Effective risk management in cybersecurity requires a thorough understanding of the interplay between attacker capabilities and defense strategies. Attack-Defense Trees (ADTs) are a commonly used methodology for representing this interplay; however, previous work in this domain has only focused on analyzing metrics such as cost, damage, or time from the perspective of the attacker. This approach provides an incomplete view of the system, as it neglects to model defender attributes: in real-world scenarios, defenders have finite resources for countermeasures and are similarly constrained. In this paper, we propose a novel framework that incorporates defense metrics into ADTs, and we present efficient algorithms for computing the Pareto front between defense and attack metrics. Our methods encode both attacker and defender metrics as semirings, allowing our methods to be used for many metrics such as cost, damage, and skill. We analyze tree-structured ADTs using a bottom-up approach and general ADTs by translating them into binary decision diagrams. Experiments on randomly generated ADTS demonstrate that both approaches effectively handle ADTs with several hundred nodes.

Original languageEnglish
Title of host publication2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
EditorsMarcello Cinque, Domenico Cotroneo, Luigi De Simone, Matthias Eckhart, Patrick P.C. Lee, Saman Zonouz
Place of PublicationPiscataway, NJ
Pages358-370
Number of pages13
ISBN (Electronic)979-8-3315-1201-9
DOIs
Publication statusPublished - 2025

Publication series

NameProceedings - Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
PublisherIEEE
Number55
Volume2025
ISSN (Print)1530-0889
ISSN (Electronic)2158-3927

Keywords

  • Pareto front
  • Attack trees
  • Attack-defense trees
  • Multi-criteria optimization

Fingerprint

Dive into the research topics of 'Attack-Defense Trees with Offensive and Defensive Attributes'. Together they form a unique fingerprint.

Cite this