eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2010/412

Optimal Adversary Behavior for the Serial Model of Financial Attack Trees

Margus Niitsoo

Abstract

Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the expected gains of an adversary based on both the cost and likelihood of the subthreats. Such a multi-parameter analysis is considerably more complicated than separate probability or skill level estimation, requiring exponential time in general. However, this paper shows that under reasonable assumptions a completely different type of optimal substructure exists which can be harnessed into a linear-time algorithm for optimal gains estimation. More concretely, we use a decision-theoretic framework in which a rational adversary sequentially considers and performs the available attacks. The assumption of rationality serves as an upper bound as any irrational behavior will just hurt the end result of the adversary himself. We show that if the attacker considers the attacks in a goal-oriented way, his optimal expected gains can be computed in linear time. Our model places the least restrictions on adversarial behavior of all known attack tree models that analyze economic viability of an attack and, as such, provides for the best efficiently computable estimate for the potential reward.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Longer version of that published at IWSEC 2010
Keywords
attack treessecurity analysis
Contact author(s)
margus niitsoo @ ut ee
History
2010-07-24: received
Short URL
https://ia.cr/2010/412
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/412,
      author = {Margus Niitsoo},
      title = {Optimal Adversary Behavior for the Serial Model of Financial Attack Trees},
      howpublished = {Cryptology ePrint Archive, Paper 2010/412},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/412}},
      url = {https://eprint.iacr.org/2010/412}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.