Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems
Résumé
Attack-Defence Trees (ADTrees) are a well-suited formalism to assess possible attacks to systems and the efficiency of countermeasures. This paper extends the available ADTree constructs with re-active patterns that cover further security scenarios, and equips all constructs with attributes such as time and cost to allow for quantitative analyses. We model ADTrees as (an extension of) Asynchronous Multi-Agents Systems: EAMAS. The ADTree-EAMAS transformation allows us to quantify the impact of different agents configurations on metrics such as attack time. Using EAMAS also permits parametric verification: we derive constraints for property satisfaction, e.g. the maximum time a defence can take to block an attack. Our approach is exercised on several case studies using the Uppaal and IMITATOR tools. We developed the open-source tool adt2amas implementing our transformation.
Origine : Fichiers produits par l'(les) auteur(s)
Loading...