Probabilistic reasoning with graphical security models

Barbara Kordy, Marc Pouly, Patrick Schweitzer

    Research output: Contribution to journalArticleAcademicpeer-review

    7 Citations (Scopus)

    Abstract

    This work provides a computational framework for meaningful probabilistic evaluation of attack–defense scenarios involving dependent actions. We combine the graphical security modeling technique of attack–defense trees with probabilistic information expressed in terms of Bayesian networks. In order to improve the efficiency of probability computations on attack–defense trees, we make use of inference algorithms and encoding techniques from constraint reasoning. The proposed approach is illustrated on a running example and the computations are automated with the help of suitable software tools. We show that the computational routines developed in this paper form a conservative generalization of the attack–defense tree formalism defined previously. We discuss the algebraic theory underlying our framework and point out several generalizations which are possible thanks to the use of semiring theory. Finally, our results apply directly to the analysis of the industrially recognized model of attack trees.
    Original languageEnglish
    Pages (from-to)111-131
    Number of pages21
    JournalInformation sciences
    Volume342
    DOIs
    Publication statusPublished - May 2016

    Keywords

    • METIS-318569
    • Socio-technical security
    • Attack patterns
    • EWI-27345
    • SysML activity diagrams
    • Systems attacks
    • Attack surfaces
    • IR-101831
    • EC Grant Agreement nr.: FP7/318003
    • EC Grant Agreement nr.: FP7/2007-2013

    Fingerprint Dive into the research topics of 'Probabilistic reasoning with graphical security models'. Together they form a unique fingerprint.

    Cite this