Skip to main content

Foundations of Attack Trees

  • Conference paper
Information Security and Cryptology - ICISC 2005 (ICISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3935))

Included in the following conference series:

Abstract

Attack trees have found their way to practice because they have proved to be an intuitive aid in threat analysis. Despite, or perhaps thanks to, their apparent simplicity, they have not yet been provided with an unambiguous semantics. We argue that such a formal interpretation is indispensable to precisely understand how attack trees can be manipulated during construction and analysis. We provide a denotational semantics, based on a mapping to attack suites, which abstracts from the internal structure of an attack tree, we study transformations between attack trees, and we study the attribution and projection of an attack tree.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. TANAT – Threat ANd Attack Tree Modeling plus Simulation (2004), http://www13.informatik.tu-muenchen.de:8080/tanat/

  2. ARES corporation. Risk techniques, fault trees. Technical report, Available from: http://www.arescorporation.com/

  3. Einarsson, S., Rausand, M.: An approach to vulnerability analysis of complex industrial systems. Risk Analysis 18(5), 535–545 (1998)

    Article  Google Scholar 

  4. Landwehr, C.E.: Formal models for computer security. Computing Surveys 13(3), 247–277 (1981)

    Article  Google Scholar 

  5. Amaneza Technologies Limited. A quick tour of attack tree based risk analysis using SecurITree. Technical report (2002)

    Google Scholar 

  6. McDermott, J.P.: Attack net penetration testing. In: Proc. 2000 workshop on New Security Paradigm, pp. 15–20. ACM, New York (2001)

    Google Scholar 

  7. Meadows, C.: Open issues in formal methods for cryptographic protocol analysis. In: DARPA Information Survivability Conference & Exposition, vol. 1, pp. 237–250 (2000)

    Google Scholar 

  8. Opel, A.: Design and implementation of a support tool for attack trees (2005)

    Google Scholar 

  9. Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proc. New Security Paradigms Workshop, pp. 71–79 (1998)

    Google Scholar 

  10. Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb’s journal (December 1999)

    Google Scholar 

  11. Schneier, B.: Secrets & Lies: Digital Security in a Networked World. Wiley, Chichester (2000)

    Google Scholar 

  12. Stefan, J., Schumacher, M.: Collaborative attack modeling. In: SAC 2002, pp. 253–259. ACM, New York (2002)

    Google Scholar 

  13. Swiler, L.P., Philips, C., Ellis, D., Chakarian, S.: Computer-attack graph generation tool. In: Proc. DARPA Information Survivability Conference and Exposition, June 2001, vol. 2, pp. 307–321 (2001)

    Google Scholar 

  14. Terese: Term Rewriting Systems. Cambridge Tracts in Theoretical Computer Science, vol. 55. Cambridge University Press, Cambridge (2003)

    Google Scholar 

  15. Tidwell, T., Larson, R., Fitch, K., Hale, J.: Modeling internet attacks. In: Proc. of the 2001 IEEE Workshop on Information Assurance and Security (2001)

    Google Scholar 

  16. Vesely, W.E., et al.: Fault tree handbook. Technical Report NUREG-0492, U.S. Nuclear Regulatory Commission (January 1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mauw, S., Oostdijk, M. (2006). Foundations of Attack Trees. In: Won, D.H., Kim, S. (eds) Information Security and Cryptology - ICISC 2005. ICISC 2005. Lecture Notes in Computer Science, vol 3935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734727_17

Download citation

  • DOI: https://doi.org/10.1007/11734727_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33354-8

  • Online ISBN: 978-3-540-33355-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics