{"title":"可逆攻击树","authors":"Aliyu Tanko Ali, Damas P. Gruska","doi":"10.1109/UEMCON53757.2021.9666564","DOIUrl":null,"url":null,"abstract":"Attack trees are threat modeling formalism for identifying potential ways a system may be compromised. The underlying idea of this formalism is that possible attack points of a system are modeled as a set of nodes, together with the set of atomic actions which an attacker may execute to compromise the system. However, as attack trees are not designed from the administrator’s point of view, they are not equipped with sets of protection actions which can be used to stop an ongoing attack. In this paper we introduce reversible attack trees, as a variant of attack trees for which an ongoing attack can be fully or partially reset to the original state of the system. Then, we investigate whether the system administrator can detect whether a possible attack has reached some critical point in which his or her action is needed to prevent the attack by bringing the system to its initial state. Later, we show how this can be modeled by Timed Automata and checked by software tool UPPAAL.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reversible Attack Trees\",\"authors\":\"Aliyu Tanko Ali, Damas P. Gruska\",\"doi\":\"10.1109/UEMCON53757.2021.9666564\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attack trees are threat modeling formalism for identifying potential ways a system may be compromised. The underlying idea of this formalism is that possible attack points of a system are modeled as a set of nodes, together with the set of atomic actions which an attacker may execute to compromise the system. However, as attack trees are not designed from the administrator’s point of view, they are not equipped with sets of protection actions which can be used to stop an ongoing attack. In this paper we introduce reversible attack trees, as a variant of attack trees for which an ongoing attack can be fully or partially reset to the original state of the system. Then, we investigate whether the system administrator can detect whether a possible attack has reached some critical point in which his or her action is needed to prevent the attack by bringing the system to its initial state. Later, we show how this can be modeled by Timed Automata and checked by software tool UPPAAL.\",\"PeriodicalId\":127072,\"journal\":{\"name\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON53757.2021.9666564\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON53757.2021.9666564","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Attack trees are threat modeling formalism for identifying potential ways a system may be compromised. The underlying idea of this formalism is that possible attack points of a system are modeled as a set of nodes, together with the set of atomic actions which an attacker may execute to compromise the system. However, as attack trees are not designed from the administrator’s point of view, they are not equipped with sets of protection actions which can be used to stop an ongoing attack. In this paper we introduce reversible attack trees, as a variant of attack trees for which an ongoing attack can be fully or partially reset to the original state of the system. Then, we investigate whether the system administrator can detect whether a possible attack has reached some critical point in which his or her action is needed to prevent the attack by bringing the system to its initial state. Later, we show how this can be modeled by Timed Automata and checked by software tool UPPAAL.