Parametric Analyses of Attack-fault Trees

被引:6
|
作者
Andre, Etienne [1 ]
Lime, Didier [2 ]
Ramparison, Mathias [3 ]
Stoelinga, Marielle [4 ]
机构
[1] Univ Lorraine, CNRS, INRIA, LORIA, F-54000 Nancy, France
[2] Ecole Cent Nantes, LS2N, CNRS, UMR 6004, Nantes, France
[3] Univ Sorbonne Paris Nord, LIPN, CNRS, F-93430 Villetaneuse, France
[4] Univ Twente, Formal Methods & Tools, Enschede, Netherlands
关键词
security; attack-fault trees; parametric timed automata; IMITATOR;
D O I
10.3233/FI-2021-2066
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Risk assessment of cyber-physical systems, such as power plants, connected devices and IT-infrastructures has always been challenging: safety (i. e., absence of unintentional failures) and security (i. e., no disruptions due to attackers) are conditions that must be guaranteed. One of the traditional tools used to consider these problems is attack trees, a tree-based formalism inspired by fault trees, a well-known formalism used in safety engineering. In this paper we define and implement the translation of attack-fault trees (AFTs) to a new extension of timed automata, called parametric weighted timed automata. This allows us to parameterize constants such as time and discrete costs in an AFT and then, using the model-checker IMITATOR, to compute the set of parameter values such that a successful attack is possible. Moreover, we add the possibility to define counter-measures. Using the different sets of parameter values computed, different attack and fault scenarios can be deduced depending on the budget, time or computation power of the attacker, providing helpful data to select the most efficient counter-measure.
引用
收藏
页码:69 / 94
页数:26
相关论文
共 50 条
  • [1] Parametric analyses of attack-fault trees
    Andre, Etienne
    Lime, Didier
    Ramparison, Mathias
    Stoelinga, Marielle
    2019 19TH INTERNATIONAL CONFERENCE ON APPLICATION OF CONCURRENCY TO SYSTEM DESIGN (ACSD 2019), 2019, : 33 - 42
  • [2] Extending Attack-Fault Trees with Runtime Verification
    Cardoso, Rafael C.
    Ferrando, Angelo
    Fisher, Michael
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2022, (371): : 193 - 207
  • [3] Quantitative security and safety analysis with attack-fault trees
    Kumar, Rajesh
    Stoelinga, Marielle
    2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, : 25 - 32
  • [4] Model-Based Generation of Attack-Fault Trees
    Groner, Raffaela
    Witte, Thomas
    Raschke, Alexander
    Hirn, Sophie
    Pekaric, Irdin
    Frick, Markus
    Tichy, Matthias
    Felderer, Michael
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023, 2023, 14181 : 107 - 120
  • [5] AN ATTACK-FAULT TREE ANALYSIS OF A MOVABLE RAILROAD BRIDGE
    Jablonski, Matthew
    Wang, Yongxin
    Yavvari, Chaitanya
    Wang, Zezhou
    Liu, Xiang
    Holt, Keith
    Wijesekera, Duminda
    CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 51 - 71
  • [6] Formalizing Security and Safety Requirements by Mapping Attack-Fault Trees on Obstacle Models with Constraint Programming Semantics
    Ponsard, Christophe
    Deprez, Jean-Christophe
    Darimont, Robert
    2020 IEEE WORKSHOP ON FORMAL REQUIREMENTS (FORMREQ 2020), 2020, : 8 - 13
  • [7] Efficient analysis algorithms for parametric Fault Trees
    Bobbio, A
    Codetta-Raiteri, D
    De Pierro, MA
    Franceschinis, G
    2005 WORKSHOP ON TECHNIQUES, METHODOLOGIES AND TOOLS FOR PERFORMANCE EVALUATION OF COMPLEX SYSTEMS, PROCEEDINGS, 2005, : 91 - +
  • [8] BDD based analysis of parametric fault trees
    Codetta-Raiteri, D.
    2006 Proceedings - Annual Reliability and Maintainability Symposium, Vols 1 and 2, 2006, : 442 - 449
  • [9] On the methods to model and analyze attack scenarios with Fault Trees
    Renda, G.
    Contini, S.
    Cojazzi, G. G. M.
    SAFETY, RELIABILITY AND RISK ANALYSIS: THEORY, METHODS AND APPLICATIONS, VOLS 1-4, 2009, : 3135 - 3142
  • [10] Grafting Trees: A Fault Attack Against the SPHINCS Framework
    Castelnovi, Laurent
    Martinelli, Ange
    Prest, Thomas
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 165 - 184