Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs

@inproceedings{Kordy2010AttackDefenseTA,
  title={Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs},
  author={Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer},
  year={2010}
}
Attack–defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack–defense trees and game theory is made explicit. We show that attack–defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure. 
14 Citations
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
TLDR
It is shown that attack-defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure.
Upper and Lower Values in Zero-Sum Stochastic Games with Asymmetric Information
A general model for zero-sum stochastic games with asymmetric information is considered. In this model, each player’s information at each time can be divided into a common information part and a
Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games
TLDR
Risk-based Cyber Camouflage Games is presented — a general-sum game model that captures the uncertainty in the attack’s success and a solution that does not rely on the attacker behavior model or past data, effective for the broad setting of strictly competitive games where previous solutions against bounded rationality prove ineffective.
Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems
TLDR
The most recent approaches for the minimization of nonconvex QP functions over polytopes, including commercial solvers such as and , are unable to solve to optimality even test instances with $$n=50$$, so it is proposed to extend with them the current benchmark set of test instances for QP problems.
Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance
TLDR
This work introduces a novel game-theoretic model of deceptive interactions of this kind between a defender and a cyber attacker, which is called the Cyber Deception Game and shows that computing the optimal deception strategy for the network administrator is NP-hard for both types of attackers.
Securing Infrastructure Facilities: When Does Proactive Defense Help?
TLDR
This article investigates how the infrastructure operator should prioritize the investment in securing a set of facilities in order to reduce the impact of a strategic adversary who can target a facility to increase the overall usage cost of the system.
Cut-The-Rope: A Game of Stealthy Intrusion
TLDR
This work model an APT as a game played on an attack graph G, and considers the following interaction pattern: the attacker chooses an attack path in G towards its target \(v_0\), and step-by-step works its way towards the goal by repeated penetrations.
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks
TLDR
This chapter leverages reinforcement learning as a unified framework to design effective adaptive cyber defenses against zero-day attacks and attacks depicted by Bayesian attack graphs.
Deep Reinforcement Learning for FlipIt Security Game
TLDR
A deep learning model in which agents successfully adapt to classes of opponents and learn the optimal counter-strategy using reinforcement learning in a game under partial observability is described.
Attack-defense trees
TLDR
A new graphical security model called attack–defense trees is developed, which generalizes the well-known attack trees model and demonstrates the usefulness of the formal foundations of attack– Defense trees by relating attack– defense terms to other scientific research disciplines.
...
...

References

SHOWING 1-7 OF 7 REFERENCES
Strategic Games on Defense Trees
TLDR
This paper uses defense trees, an extension of attack trees with countermeasures, to represent attack scenarios and game theory to detect the most promising actions attacker and defender, providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
Foundations of Attack-Defense Trees
We introduce and give formal definitions of attack-defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is
Serial Model for Attack Tree Computations
TLDR
An efficient algorithm for computing the attacker's expected outcome based on the given order of the elementary attacks is proposed and the pros and cons of considering general rooted directed acyclic graphs instead of plain trees as the foundations for attack modelling are discussed.
Foundations of Attack Trees
TLDR
A denotational semantics is provided, based on a mapping to attack suites, which abstracts from the internal structure of an attack tree, which is indispensable to precisely understand how attack trees can be manipulated during construction and analysis.
Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security
TLDR
This work has extended the concept of attack trees to a new tree structure called a protection tree as a tool for decision makers to allocate limited resources towards the appropriate defenses against a specified attack.
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems
TLDR
A generic architecture for runtime monitoring and optimization of IDS based on the challenge insertion that allows the system to measure the expected undetected loss and to improve its performance with respect to the relevant threats, as verified in the experiments performed on live network traffic.
Secrets and Lies