首页 | 官方网站   微博 | 高级检索  
     


Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Authors:Stefano Bistarelli  Pamela Peretti  Irina Trubitsyna  
Affiliation:aDipartimento di Scienze, Università degli Studi “G. D'Annunzio”, Pescara, Italy;bIstituto di Informatica e Telematica, CNR Pisa, Italy;cDEIS, Università della Calabria, Rende, Italy
Abstract:Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to stop all the vulnerabilities.In order to represent preferences among possible countermeasures of a given attack, defence trees are enriched with conditional preferences, obtaining a new structure called CP-defence tree. In this paper we transform a CP-defence tree with preferences among attacks and countermeasures in an Answer Set Optimization (ASO) program. The ASO program, representing the overall scenario, is a special composition of the programs associated to each branch of a CP-defence tree. We describe an implementation that select the best set of countermeasure able to mitigate all the vulnerabilities by computing the optimal answer set of the corresponding ASO program.
Keywords:Defence tree  Answer Set Programming  CR-Prolog
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号