15
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: not found

      Attribute Decoration of Attack–Defense Trees :

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Attack–defense trees can be used as part of threat and risk analysis for system development and maintenance. They are an extension of attack trees with defense measures. Moreover, tree nodes can be decorated with attributes, such as probability, impact, and penalty, to increase the expressiveness of the model. Attribute values are typically assigned based on cognitive estimations and historically recorded events. This paper presents a practical case study with attack–defense trees. First, the authors create an attack–defense tree for an RFID-based goods management system for a warehouse. Then, they explore how to use a rich set of attributes for attack and defense nodes and assign and aggregate values to obtain condensed information, such as performance indicators or other key security figures. The authors discuss different modeling choices and tradeoffs. The case study led them to define concrete guidelines that can be used by software developers, security analysts, and system owners when performing similar assessments.

          Related collections

          Most cited references22

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          So long, and no thanks for the externalities

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Experimental comparison of attack trees and misuse cases for security threat identification

                Bookmark

                Author and article information

                Journal
                International Journal of Secure Software Engineering
                IGI Global
                1947-3036
                1947-3044
                April 2012
                April 2012
                : 3
                : 2
                : 1-35
                Affiliations
                [1 ]TXT e-solutions, Italy
                [2 ]University of Luxembourg, Luxembourg
                [3 ]SINTEF ICT, Norway
                Article
                10.4018/jsse.2012040101
                18f191b1-020d-4d5f-8315-0dcf7cf62d6d
                © 2012
                History

                Comments

                Comment on this article