We present a new fully adaptive computational model for attack trees that allows attackers to repeat atomic attacks if they fail and to play on if they are caught and have to pay penalties. The new model allows safer conclusions about the security of real-life systems and is somewhat (computationally) easier to analyze. We show that in the new model optimal strategies always exist and finding the optimal strategy is (just) an NP-complete problem. We also present methods to compute adversarial utility estimation and utility upper bound approximated estimation using a bottom-up approach. © Springer International Publishing 2013.
CITATION STYLE
Buldas, A., & Lenin, A. (2013). New efficient utility upper bounds for the fully adaptive model of attack trees. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8252 LNCS, pp. 192–205). Springer Verlag. https://doi.org/10.1007/978-3-319-02786-9_12
Mendeley helps you to discover research relevant for your work.