Download presentation
Presentation is loading. Please wait.
Published byClare Evans Modified over 9 years ago
1
Authors: Edge K.S., Dalton G.C., Raines R.A. and Mills R.F. Affiliation: Air Force Inst. of Technol. Published by: Military Communications Conference, 2006. MILCOM 2006. IEEE Presented by Yean-Ru Chen Dec. 23, 2011 Using attack and protection trees to analyze threats and defenses to homeland security
2
Outline Introduction & Motivation Attack Trees Metrics Protection Trees Homeland Security Information Network (HSIN) Example and Results & Analysis Conclusions 2
3
Introduction & Motivation To provide a reliable, cost effective (with limited resources) method to decide how to best protect a critical system from attackers. Using attack trees to find out the vulnerabilities and using protection trees to take successfully and appropriately defenses from attacks. 3
4
Attack Trees It is also called Threat Logic Trees (TLT). Tree structure with child nodes having AND or OR relationships. Root node: attacker’s goal Can be further decomposed into sub-goals Leaf nodes: individual attacker actions (attackers can actually control) AND OR 4
5
Metrics Attack Tree 5
6
Metrics P: probability of success (attack successfully) Obtained by either analyst estimation or historical data Cost: cost to carry out a certain attack/the sub-goal/the goal Obtained by either analyst estimation or historical data Impact: impact to the system Risk: calculated using the other metrics 6
7
Metrics 7
8
8
9
The parent of nodes with an OR relationship always has a higher probability of success then any of the child nodes. The parent node of children with an AND relationship always has a lower probability of success than the highest (? lowest) probability child node. 9
10
Protection Trees Compared with attack tree: also AND/OR type tree structures Protection trees can yield an analysis of where protections should be placed in order to get the greatest protection for the least expenditure of resources. The root node of a protection tree directly corresponds with the root node in an attack tree, but the rest of the tree's structure may differ widely. 10
11
OR in attack tree AND in protection tree There is not always a one to one correspondence between nodes in the attack tree and the protection tree. 11
12
12
13
Homeland Security Information Network (HSIN) Example and Results & Analysis For example: Now we just have only $25K of resources available to use in protecting the JRIES system Highest Risk Attack Tree Protection Tree 13
14
We choose the cheapest one to protect server. cheaper one Protection Tree 14
15
15
16
16
17
Finally, they use 22k to reduce the probability of success and let the attatacker should spend much money to attack. Before After 17
18
Conclusions This paper has shown how attack and protection trees can be used to analyze a system's vulnerabilities and determine where to place appropriate protections in a logical manner. Metrics that can be used in attack and protection trees were introduced and operators for the metrics were developed. 18
19
19
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.