DocumentCode :
3408571
Title :
Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security
Author :
Edge, Kenneth S. ; Dalton, George C., II ; Raines, Richard A. ; Mills, Robert F.
Author_Institution :
Air Force Inst. of Technol., Wright-Patterson AFB, OH
fYear :
2006
fDate :
23-25 Oct. 2006
Firstpage :
1
Lastpage :
7
Abstract :
Attacks against computer networks are a serious threat and occur quite often. Currently there are methods using attack trees that can be used to model how these attacks may occur. We have extended this concept to a new tree structure called a protection tree as a tool for decision makers to allocate limited resources towards the appropriate defenses against a specified attack. Protection trees ensure these limited resources are used in a manner to achieve the highest probability of success in stopping an attack. Protection trees are produced systematically by first developing an attack tree, computing metrics for each node of an attack, and then developing a corresponding protection tree with similar metrics. Eventually, libraries of attacks and available protections can be used to automate the process of developing the trees. An example attack and protection tree is used to notionally show how an organization such as the department of homeland security can allocate resources to protect their computer networks from being compromised. Decision makers in the organization can use the resultant protection tree to determine where to allocate limited resources for the best protection of their network
Keywords :
computer networks; decision making; national security; probability; resource allocation; telecommunication security; tree data structures; attack tree; computer network attack; computing metrics; decision making; defense; homeland security; protection tree; resource allocation; success probability; tree structure; Computer network reliability; Computer networks; Costs; Logic; Performance analysis; Protection; Resource management; Risk analysis; Terrorism; Tree data structures;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2006. MILCOM 2006. IEEE
Conference_Location :
Washington, DC
Print_ISBN :
1-4244-0617-X
Electronic_ISBN :
1-4244-0618-8
Type :
conf
DOI :
10.1109/MILCOM.2006.302512
Filename :
4086696
Link To Document :
بازگشت