Exploiting Bayesian Networks for the Analysis of Combined Attack Trees
Author(s) -
Marco Gribaudo,
Mauro Iacono,
S. Marrone
Publication year - 2015
Publication title -
electronic notes in theoretical computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.242
H-Index - 60
ISSN - 1571-0661
DOI - 10.1016/j.entcs.2014.12.014
Subject(s) - rotation formalisms in three dimensions , computer science , bayesian network , formalism (music) , set (abstract data type) , transformational leadership , computer security , bayesian probability , data mining , theoretical computer science , artificial intelligence , mathematics , art , musical , geometry , public relations , political science , visual arts , programming language
The growing need to find proper countermeasures able to protect critical infrastructures from threats has addressed the definition of quantitative methodologies for risk assessment. One of the most difficult aspects in this topic is the evaluation of the effects of attacks. Attacks Trees represent one of the most used formalisms in the modeling of attack scenarios: notwithstanding some extensions have been proposed to enrich the expressiveness of the original formalism, some effort should be spent on their analyzability. This paper defines a transformational approach that translates Attack Trees into Bayesian Networks. The proposed approach can cope with different Attack Trees extensions; moreover, it allows the quantitative evaluation of combined attacks modelled as a set of Attack Trees
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom