This work addresses the growing need of performing meaningful probabilistic analysis of security. We propose a framework that integrates the graphical security modeling technique of attack-defense trees with probabilistic information expressed in terms of Bayesian networks. This allows us to perform probabilistic evaluation of attack-defense scenarios involving dependent actions. To improve the efficiency of our computations, we make use of inference algorithms from Bayesian networks and encoding techniques from constraint reasoning. We discuss the algebraic theory underlying our framework and point out several generalizations which are possible thanks to the use of semiring theory. © 2014 Springer International Publishing.
CITATION STYLE
Kordy, B., Pouly, M., & Schweitzer, P. (2014). A probabilistic framework for security scenarios with dependent actions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8739 LNCS, pp. 256–271). Springer Verlag. https://doi.org/10.1007/978-3-319-10181-1_16
Mendeley helps you to discover research relevant for your work.