Time-dependent analysis of attacks
Autor: | Holger Hermanns, Reza Pulungan, Florian Arnold, Mariëlle Stoelinga |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2014 |
Předmět: |
Attack trees
EWI-24810 Computer science Cumulative distribution function Attack tree Computer security computer.software_genre IR-91469 Formalism (philosophy of mathematics) EC Grant Agreement nr.: FP7/318003 phase type EC Grant Agreement nr.: FP7/2007-2013 Security METIS-305906 Probability distribution Exit rate EC Grant Agreement nr.: FP7/318490 EC Grant Agreement nr.: FP7/295261 Algorithm computer |
Zdroj: | Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014, 285-305 STARTPAGE=285;ENDPAGE=305;TITLE=Proceedings of the Third International Conference on Principles and Security of Trust, POST 2014 Lecture Notes in Computer Science ISBN: 9783642547911 POST |
Popis: | The success of a security attack crucially depends on time: the more time available to the attacker, the higher the probability of a successful attack; when given enough time, any system can be compromised. Insight in time-dependent behaviors of attacks and the evolution of the attacker’s success as time progresses is therefore a key for effective countermeasures in securing systems. This paper presents an efficient technique to analyze attack times for an extension of the prominent formalism of attack trees. If each basic attack step, i.e., each leaf in an attack tree, is annotated with a probability distribution of the time needed for this step to be successful, we show how this information can be propagated to an analysis of the entire tree. In this way, we obtain the probability distribution for the entire system to be attacked successfully as time progresses. For our approach to be effective, we take great care to always work with the best possible compression of the representations of the probability distributions arising. This is achieved by an elegant calculus of acyclic phase type distributions, together with an effective compositional compression technique. We demonstrate the effectiveness of this approach on three case studies, exhibiting orders of magnitude of compression. |
Databáze: | OpenAIRE |
Externí odkaz: |