Discovering, quantifying, and displaying attacks
نویسندگان
چکیده
In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially when distributed components are involved, it is hard to predict and confront all possible attacks. A main challenge in the development of complex systems is therefore to discover attacks, quantify them to comprehend their likelihood, and communicate them to non-experts for facilitating the decision process. To address this three-sided challenge we propose a protection analysis over the Quality Calculus that (i) computes all the sets of data required by an attacker to reach a given location in a system, (ii) determines the cheapest set of such attacks for a given notion of cost, and (iii) derives an attack tree that displays the attacks graphically. The protection analysis is first developed in a qualitative setting, and then extended to quantitative settings following an approach applicable to a great many contexts. The quantitative formulation is implemented as an optimisation problem encoded into Satisfiability Modulo Theories, allowing us to deal with complex cost structures. The usefulness of the framework is demonstrated on a national-scale authentication system, studied through a Java implementation of the framework. 2012 ACM CCS: [Theory of computation]: Semantics and reasoning.
منابع مشابه
Discovering and Quantifying Mean Streets: A Summary of Results
Mean streets represent those connected subsets of a spatial network whose attribute values are significantly higher than expected. Discovering and quantifyingmean streets is an important problem with many applications such as detecting high-crime-density streets and high crash roads (or areas) for public safety, detecting urban cancer disease clusters for public health, detecting human activity...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملA Dynamic Approach for Honeypot Management
Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
متن کاملDiscovering Customer Journey Maps using a Mixture of Markov Models
Customer Journey Maps (CJMs) summarize the behavior of customers by displaying the most common sequences of steps they take when engaging with a company or product. In many practical applications, the challenge lies in automatically discovering these prototypical sequences from raw event logs for thousands of customers. We propose a novel, probabilistic approach based on a mixture of Markov mod...
متن کاملTriple tandem mimotope peptide of Epidermal Growth Factor Receptor displaying on the surface of M13 phage induces anti-tumor response in mice tumor model
Introduction: Epidermal growth factor receptor (EGFR) has been shown to play a critical role in tumor cell growth and its overexpression has been observed in many epithelial tumors. In the field of cancer vaccine research, displaying the peptide mimotope on the surface of phage particles has shown promising results. Methods: In this study using m13-PVIII phage display system, two constructs we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Logical Methods in Computer Science
دوره 12 شماره
صفحات -
تاریخ انتشار 2016