Premium Essay

Attack Countermeasure Trees (Act): Towards Unifying the Constructs of Attack and Defense Trees

In: Computers and Technology

Submitted By sidhurox
Words 8828
Pages 36
SECURITY AND COMMUNICATION NETWORKS
Security Comm. Networks (2011)
Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.299

SPECIAL ISSUE PAPER

Attack Countermeasure Trees (ACT): towards unifying the constructs of attack and defense trees
Arpan Roy* , Dong Seong Kim and Kishor S. Trivedi
Department of Electrical & Computer Engineering, Duke University, Durham, NC 27708, U.S.A.

ABSTRACT
Attack tree (AT) is one of the widely used non-state-space models for security analysis. The basic formalism of AT does not take into account defense mechanisms. Defense trees (DTs) have been developed to investigate the effect of defense mechanisms using measures such as attack cost, security investment cost, return on attack (ROA), and return on investment
(ROI). DT, however, places defense mechanisms only at the leaf nodes and the corresponding ROI/ROA analysis does not incorporate the probabilities of attack. In attack response tree (ART), attack and response are both captured but ART suffers from the problem of state-space explosion, since solution of ART is obtained by means of a state-space model. In this paper, we present a novel attack tree paradigm called attack countermeasure tree (ACT) which avoids the generation and solution of a state-space model and takes into account attacks as well as countermeasures (in the form of detection and mitigation events). In ACT, detection and mitigation are allowed not just at the leaf node but also at the intermediate nodes while at the same time the state-space explosion problem is avoided in its analysis. We study the consequences of incorporating countermeasures in the ACT using three case studies (ACT for BGP attack, ACT for a SCADA attack and
ACT for malicious insider attacks). Copyright © 2011 John Wiley & Sons, Ltd.
KEYWORDS
attack trees; non-state-space model; mincuts;…...

Similar Documents

Premium Essay

Sql Quiz

...solutions. Switching implementations now dominate applications in which bridging technologies were implemented in prior network designs. Superior throughput performance, higher port density, lower per-port cost, and greater flexibility have contributed to the emergence of switches as replacement technology for bridges and as complements to routing technology. The following articles provide information about the technologies employed in devices loosely referred to as bridges and switches: * Transparent Bridging * Mixed-Media Bridging * Source-Route Bridging * Asynchronous Transfer Mode Switching * LAN Switching and VLANs * MPLS/Tag Switching * Data-Link Switching * Tag Switching Routing Routing is the act of moving information across an internetwork from a source to a destination. Along the way, at least one intermediate node typically is encountered. Routing is often contrasted with bridging, which might seem to accomplish precisely the same thing to the casual observer. The primary difference between the two is that bridging occurs at Layer 2 (the link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer). This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways. The following articles provide information different routing technologies: *......

Words: 217433 - Pages: 870

Free Essay

Lalala

...warm-blooded because flying implies a high rate of metabolism, which in turn implies a high internal temperature. Huxley speculated that a coat of hair would insulate against loss of body heat and might streamline the body to reduce drag in flight. The recent discovery of a pterosaur specimen covered in long, dense, and relatively thick hairlike fossil material was the first clear evidence that his reasoning was correct. Efforts to explain how the pterosaurs became airborne have led to suggestions that they launched themselves by jumping from cliffs, by dropping from trees, or even by rising into light winds from the crests of waves. Each hypothesis has its difficulties. The first wrongly assumes that the pterosaurs’ hind feet resembled a bat’s and could serve as hooks by which the animal could hang in preparation for flight. The second hypothesis seems unlikely because large pterosaurs could not have landed in trees without damaging their wings. The third calls for high waves to channel updrafts. The wind that made such waves however, might have been too strong for the pterosaurs to control their flight once airborne. 1. It can be inferred from the passage that scientists now generally agree that the (A) enormous wingspan of the pterosaurs enabled them to fly great distances (B) structure of the skeleton of the pterosaurs suggests a close evolutionary relationship to bats (C) fossil remains of the pterosaurs reveal how they solved the problem of powered flight ......

Words: 413042 - Pages: 1653

Free Essay

Global Financial Crisis and Protectionism

...Reader: May you find happiness. PREFACE TO THE 10TH ANNIVERSARY EDITION by His Holiness the Dalai Lama I am very happy to learn that the publisher of The Art of Happiness—which I cowrote with my old friend, the American psychiatrist Howard Cutler—is bringing out a tenth anniversary edition of the book. Those who have read the book will know that it was the result of many hours of discussion, with Howard representing the current scientific perspective and me representing the Buddhist understanding of the issues pertaining to mental health and human well-being. So when the book was received well by the general public, I felt a deep sense of satisfaction since this indicated that our labor had made some contribution towards others’ happiness and wellbeing. Though each of us, the two authors, came from different perspectives, we always endeavored to bring our discussion to the basic human level, the level where distinctions between people—gender, race, religion, culture, and language—break down. At this fundamental level, we are all the same; each one of us aspires to happiness and each one of us does not wish to suffer. This is our most fundamental reality. And on this level, the problems that we each face as human beings remain the same. Given this belief, whenever I have the opportunity to engage with the general public, I always try to draw people’s attention to this fundamental sameness of the human family and the deeply......

Words: 89236 - Pages: 357

Premium Essay

Mobile Os

...I/0 Requests to Hardware Operations 578 13.6 STREAMS 580 13.7 Performance 582 13.8 Summary 585 Exercises 586 Bibliographical Notes 588 xviii PART SIX Chapter 14 14.1 14.2 14.3 14.4 14.5 14.6 PROTECTION AND SECURITY System Protection Goals of Protection 591 Principles of Protection 592 Domain of Protection 593 Access Matrix 598 Implementation of Access Matrix Access Control 605 Chapter 15 15.1 15.2 15.3 15.4 15.5 15.6 15.7 • 14.7 14.8 14.9 14.10 602 System Security The Security Problem 621 15.8 Computer-Security Classifications 662 Program Threats 625 15.9 An Example: Windows XP 664 System and Network Threats 633 Cryptography as a Security Tool 638 15.10 Summary 665 Exercises 666 User Authentication 649 Implementing Security Defenses 654 Bibliographical Notes 667 Firewalling to Protect Systems and Networks 661 PART SEVEN Chapter 16 • DISTRIBUTED SYSTEMS Distributed Operating Systems 16.1 Motivation 673 16.2 Types of Networkbased Operating Systems 675 16.3 Network Structure 679 16.4 Network Topology 683 16.5 Communication Structure 684 16.6 Communication Protocols 690 Chapter 17 17.1 17.2 17.3 17.4 17.5 16.7 16.8 16.9 16.10 Robustness 694 Design Issues 697 An Example: Networking 699 Summary 701 Exercises 701 Bibliographical Notes 703 Distributed File Systems Background 705 Naming and Transparency 707 Remote File Access 710 Stateful versus Stateless Service 715 File Replication 716 Chapter 18 18.1 18.2 18.3 18.4 18.5 Revocation of Access Rights......

Words: 403018 - Pages: 1613

Free Essay

Code

...was not yet present. Cyberspace was increasingly everywhere, but it was very hard for those in the audience to imagine it tamed to serve the ends of government. And at that time, commerce was certainly interested in cyberspace, though credit card companies were still warning customers to stay far away from the Net. The Net was an exploding social space of something. But it was hard to see it as an exploding space of social control. xiii xiv preface to the first edition I didn’t see either speech. I first listened to them through my computer, three years after they were given. Their words had been recorded; they now sit archived on a server at MIT.1 It takes a second to tune in and launch the recording of their speeches. The very act of listening to these lectures given years before—served on a reliable and indexed platform that no doubt recorded the fact that I had listened, across high-speed, commercial Internet lines that feed my house both the Internet and ABC News—confirmed something of their account. One can hear in the audience’s reaction a recognition that these authors were talking fiction—they were science-fiction writers, after all. But the fiction they spoke terrified those who listened. Ten years later, these tales are no longer fiction. It is no longer hard to understand how the Net could become a more perfectly regulated space or how the forces behind commerce could play a role in facilitating that regulation. The ongoing battle over peer-to-peer......

Words: 190498 - Pages: 762

Premium Essay

Globel Stratergy

...any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Global Strategy, 3rd Edition ª 2014, 2009 South-Western, Cengage Learning Mike W. Peng ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. Senior Vice President, LRS/Acquisitions & Solutions Planning; Jack W. Calhoun Editorial Director, Business & Economics: Erin Joyner Senior Acquisitions Editor: Michele Rhoades Associate Development Editor: Josh Wells For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 Editorial Assistant: Tamara Grega Brand Manager: Robin Lefevre For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Market Development Manager: Jonathan Monahan Media Editor: Rob......

Words: 305832 - Pages: 1224

Free Essay

The Public Needs to Know

...effort (and resulting in his subsequent mental collapse), the code was broken. A German official had been leaked news of the cracking of PURPLE and had passed this information on to Tokyo. Fortunately, the Japanese refused to believe it. But the Japanese weren’t the only skeptics. It is disturbing to learn that the Signal Intelligence Service had warned their superiors about the Japanese plans for Pearl harbor—to the day and hour—but these warnings were dismissed.29 (There seems to be an eerie parallel in the present willingness by many to dismiss the controversial “Bible codes” as well.) The abrupt vanquishing of the Nazi North Atlantic submarine wolfpacks, the air interception of Japan’s Admiral Yamamoto—who had devised the attack on Pearl Harbor—and the pivotal destruction of the Japanese carrier fleet at the Battle of Midway, were all results of the breaking of secret codes. THE ADVENT OF THE COMPUTER ******ebook converter DEMO - www.ebook-converter.com******* ******Created by ebook converter - www.ebook-converter.com****** The recognition and urgency of the development of ever more sophisticated techniques in cryptology, computation, and mathematical statistics led to the ULTRA project. Two of the quiet heroes of the U LTRA endeavor were Alan Turing in London and John von Neumann at Los Alamos, both worldrenowned mathematicians. Turing became known as the “father of computing software” and the theory of automata; Von Neumann, the “father of......

Words: 141008 - Pages: 565

Premium Essay

Operating Systems

...Secret-Key Cryptography 9.2.2 Public-Key Cryptography 9.2.3 One-Way Functions 9.2.4 Digital Signatures 9.3 USER AUTHENTICATION 9.3.1 Authentication Using Passwords How Crackers Break In UNIX Password Security Improving Password Security One-Time Passwords Challenge-Response Authentication 9.3.2 Authentication Using a Physical Object 9.3.3 Authentication Using Biometrics 9.3.4 Countermeasures 9.4 ATTACKS FROM INSIDE THE SYSTEM 9.4.1 Trojan Horses 9.4.2 Login Spoofing 9.4.3 Logic Bombs 9.4.4 Trap Doors 9.4.5 Buffer Overflow 9.4.6 Generic Security Attacks 9.4.7 Famous Security Flaws Famous Security Flaws in UNIX Famous Security Flaws in TENEX Famous Security Flaws in OS/360 9.4.8 Design Principles for Security 9.5 ATTACKS FROM OUTSIDE THE SYSTEM 9.5.1 Virus Damage Scenarios 9.5.2 How Viruses Work Companion Viruses Executable Program Viruses Memory Resident Viruses Boot Sector Viruses Device Driver Viruses Macro Viruses Source Code Viruses 9.5.3 How Viruses Spread 9.5.4 Antivirus and Anti-Antivirus Techniques Virus Scanners Integrity Checkers Behavioral Checkers Virus Avoidance Recovery from a Virus Attack 9.5.5 The Internet Worm 9.5.6 Mobile Code Sandboxing Interpretation Code signing 9.5.7 Java Security 9.6 PROTECTION MECHANISMS 9.6.1 Protection Domains 9.6.2 Access Control Lists 9.6.3 Capabilities 9.7 TRUSTED SYSTEMS 9.7.1 Trusted Computing Base 9.7.2 Formal Models of Secure Systems 9.7.3 Multilevel Security The Bell-La Padula Model The Biba Model 9.7.4 Orange Book......

Words: 387392 - Pages: 1550

Premium Essay

Strategic Managment and Business Policy 13th Edition

...Reason for existence Objectives What results to accomplish by when Strategies Plan to achieve the mission & objectives Policies Broad guidelines for decision making Industry analysis Programs Activities needed to accomplish a plan Budgets Cost of the programs Procedures Sequence of steps needed to do the job Internal: Strengths and Weaknesses Structure: Chain of command Culture: Beliefs, expectations, values Resources: Assets, skills, competencies, knowledge Feedback/Learning: Make corrections as needed Performance Actual results THIRTEENTH EDITION Strategic Management and Business Policy TOWARD GLOBAL SUSTAINABILITY This page intentionally left blank THIRTEENTH EDITION Strategic Management and Business Policy TOWARD GLOBAL SUSTAINABILITY Thomas L. Wheelen J. David Hunger Formerly with University of Virginia Trinity College, Dublin, Ireland Iowa State University St. John’s University with major contributions by Kathryn E. Wheelen Alan N. Hoffman Bentley University Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal ~ Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Senior Acquisitions Editor: Kim Norbuta Editorial Project Manager: Claudia Fernandes Editorial Assistant:......

Words: 478969 - Pages: 1916

Premium Essay

Managing Information Technology (7th Edition)

...Telecommuters Managing IT Applications 546 546 548 An Applications Portfolio Approach 548 Metrics for IT Applications Management 549 Managing IT Human Resources 549 Managing the Business/IT Relationship 553 Measuring Overall IS Performance 554 Special Issue: IS Management in Global Organizations Special Issue: Managing IT Outsourcing 556 Review Questions 558 • Discussion Questions 559 • Bibliography 559 Chapter 14 Information Security 561 Computer Crime 561 The Chief Security Officer Role 565 554 520 Contents Risk Management for Information Security 565 Compliance with Laws and Regulations 567 Sarbanes-Oxley (SOX) 567 Gramm-Leach-Bliley Act of 1999 (GBLA) 569 Health Insurance Portability and Accountability Act (HIPAA) The PATRIOT Act 569 Organizational Polices for Information Security Planning for Business Continuity 571 Electronic Records Management (ERM) 571 569 Review Questions 573 • Discussion Questions 574 • Bibliography 574 Chapter 15 Social, Ethical, and Legal Issues 575 The Legal Environment 575 Ethics Frameworks 576 Identifying Ethical Problems Analyzing Ethical Problems 576 577 Social Issues 578 Privacy 579 Privacy Problems 579 E-Commerce Privacy Concerns 580 Workplace Privacy 581 Ethics of Invasion of Privacy 582 Laws on Privacy 582 Identity Theft 583 Impact of Identity Theft 584 Laws on Identity Theft 585 Intellectual Property......

Words: 239887 - Pages: 960

Premium Essay

Financial Management Ed 13

...Manufacturing Coordinator: Kevin Kluck Production House/Compositor: Integra Software Services Pvt. Ltd. Senior Art Director: Michelle Kunkler Cover and Internal Designer: Rokusek Design Cover Images: © Lael Henderson/Stock Illustration Source/Getty Images, Inc. ©2011, 2009 South-Western, a part of Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com ExamView® and ExamView Pro® are registered trademarks of FSCreations, Inc. Windows is a registered trademark of the Microsoft Corporation used herein under license. Macintosh and Power Macintosh are registered trademarks of Apple Computer, Inc. used herein under license. Library of Congress Control Number: 2010920554 Student Edition ISBN 13: 978-1-4390-7810-5 Student......

Words: 601456 - Pages: 2406

Premium Essay

Biotechnology

... A01_CHAF9601_04_SE_FM.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 10:59 Page iii Fourth Edition E-BUSINESS AND E-COMMERCE MANAGEMENT STRATEGY, IMPLEMENTATION AND PRACTICE Dave Chaffey A01_CHAF9601_04_SE_FM.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 10:59 Page iv Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsoned.co.uk First published 2002 Second edition published 2004 Third edition published 2007 Fourth edition published 2009 © Dave Chaffey 2002 © Marketing Insights Limited 2002, 2009 The right of Dave Chaffey to be identified as author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a licence permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS. All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such......

Words: 404133 - Pages: 1617