Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems

Jaime Arias, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Mariëlle Stoelinga

Research output: Contribution to journalArticleAcademic

10 Downloads (Pure)

Abstract

Attack-Defence Trees (ADTs) are well-suited to assess possible attacks to systems and the efficiency of counter-measures. In this paper, we first enrich the available constructs with reactive patterns that cover further security scenarios, and equip all constructs with attributes such as time and cost to allow quantitative analyses. Then, ADTs are modelled as (an extension of) Asynchronous Multi-Agents Systems— EAMAS. The ADT–EAMAS transformation is performed in a systematic manner that ensures correctness. The transformation allows us to quantify the impact of different agents configurations on metrics such as attack time. Using EAMAS also permits parametric verification: we derive constraints for property satisfaction. Our approach is exercised on several case studies using the Uppaal and IMITATOR tools.
Original languageEnglish
Number of pages19
JournalarXiv.org
Volume1906.05283
Publication statusPublished - 2019

Fingerprint Dive into the research topics of 'Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems'. Together they form a unique fingerprint.

  • Cite this

    Arias, J., Budde, C. E., Penczek, W., Petrucci, L., & Stoelinga, M. (2019). Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems. arXiv.org, 1906.05283.