Presentation is loading. Please wait.

Presentation is loading. Please wait.

Authors: Edge K.S., Dalton G.C., Raines R.A. and Mills R.F. Affiliation: Air Force Inst. of Technol. Published by: Military Communications Conference,

Similar presentations


Presentation on theme: "Authors: Edge K.S., Dalton G.C., Raines R.A. and Mills R.F. Affiliation: Air Force Inst. of Technol. Published by: Military Communications Conference,"— Presentation transcript:

1 Authors: Edge K.S., Dalton G.C., Raines R.A. and Mills R.F. Affiliation: Air Force Inst. of Technol. Published by: Military Communications Conference, 2006. MILCOM 2006. IEEE Presented by Yean-Ru Chen Dec. 23, 2011 Using attack and protection trees to analyze threats and defenses to homeland security

2 Outline  Introduction & Motivation  Attack Trees  Metrics  Protection Trees  Homeland Security Information Network (HSIN) Example and Results & Analysis  Conclusions 2

3 Introduction & Motivation  To provide a reliable, cost effective (with limited resources) method to decide how to best protect a critical system from attackers.  Using attack trees to find out the vulnerabilities and using protection trees to take successfully and appropriately defenses from attacks. 3

4 Attack Trees  It is also called Threat Logic Trees (TLT).  Tree structure with child nodes having AND or OR relationships.  Root node: attacker’s goal  Can be further decomposed into sub-goals  Leaf nodes: individual attacker actions (attackers can actually control) AND OR 4

5 Metrics  Attack Tree 5

6 Metrics  P: probability of success (attack successfully)  Obtained by either analyst estimation or historical data  Cost: cost to carry out a certain attack/the sub-goal/the goal  Obtained by either analyst estimation or historical data  Impact: impact to the system  Risk: calculated using the other metrics 6

7 Metrics 7

8 8

9  The parent of nodes with an OR relationship always has a higher probability of success then any of the child nodes.  The parent node of children with an AND relationship always has a lower probability of success than the highest (? lowest) probability child node. 9

10 Protection Trees  Compared with attack tree: also AND/OR type tree structures  Protection trees can yield an analysis of where protections should be placed in order to get the greatest protection for the least expenditure of resources.  The root node of a protection tree directly corresponds with the root node in an attack tree, but the rest of the tree's structure may differ widely. 10

11  OR in attack tree AND in protection tree  There is not always a one to one correspondence between nodes in the attack tree and the protection tree. 11

12 12

13 Homeland Security Information Network (HSIN) Example and Results & Analysis For example: Now we just have only $25K of resources available to use in protecting the JRIES system Highest Risk Attack Tree Protection Tree 13

14 We choose the cheapest one to protect server. cheaper one Protection Tree 14

15 15

16 16

17 Finally, they use 22k to reduce the probability of success and let the attatacker should spend much money to attack. Before After 17

18 Conclusions  This paper has shown how attack and protection trees can be used to analyze a system's vulnerabilities and determine where to place appropriate protections in a logical manner.  Metrics that can be used in attack and protection trees were introduced and operators for the metrics were developed. 18

19 19


Download ppt "Authors: Edge K.S., Dalton G.C., Raines R.A. and Mills R.F. Affiliation: Air Force Inst. of Technol. Published by: Military Communications Conference,"

Similar presentations


Ads by Google