GameSec 2010: Decision and Game Theory for Security pp 245-256 | Cite as
Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Conference paper
Abstract
Attack–defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack–defense trees and game theory is made explicit. We show that attack–defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure.
Keywords
Game Theory Intrusion Detection System Defense Tree Conjunctive Node Attack Modeling
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Schneier, B.: Secrets and lies. Wiley, Indianapolis (2004)Google Scholar
- 2.Mauw, S., Oostdijk, M.: Foundations of Attack Trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 3.Willemson, J., Jürgenson, A.: Serial Model for Attack Tree Computations. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 118–128. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 4.Rehák, M., Staab, E., Fusenig, V., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Engel, T.: Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 61–80. Springer, Heidelberg (2009)Google Scholar
- 5.Amenaza: SecurITree, http://www.amenaza.com/
- 6.Isograph: AttackTree+, http://www.isograph-software.com/atpover.htm
- 7.Edge, K.S., Dalton II, G.C., Raines, R.A., Mills, R.F.: Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security. In: MILCOM, pp. 1–7. IEEE, Los Alamitos (2006)Google Scholar
- 8.Bistarelli, S., Dall’Aglio, M., Peretti, P.: Strategic Games on Defense Trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 1–15. Springer, Heidelberg (2006)Google Scholar
- 9.Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of Attack–Defense Trees. In: FAST. LNCS. Springer, Heidelberg (2010), http://satoss.uni.lu/members/barbara/papers/adt.pdf Google Scholar
- 10.Kordy, B., Mauw, S., Melissen, M., Schweitzer, P.: Attack–defense trees and two-player binary zero-sum extensive form games are equivalent – technical report with proofs, http://arxiv.org/abs/1006.2732
Copyright information
© Springer-Verlag Berlin Heidelberg 2010