Attack tree metrics are operad algebras
Abstract: Attack Trees (ATs) are a widely used tool for security analysis. ATs can be employed in quantitative security analysis through metrics, which assign a security value to an AT. Many different AT metrics exist, and there exist multiple general definitions that aim to study a wide variety of AT metrics at once. However, these all have drawbacks: they do not capture all metrics, and they do not easily generalize to extensions of ATs. In this paper, we introduce a definition of AT metrics based on category theory, specifically operad algebras. This encompasses all previous definitions of AT metrics, and is easily generalized to extensions of ATs. Furthermore, we show that under easily expressed operad-theoretic conditions, existing metric calculation algorithms can be extended in considerable generality.
- John C Baez and Nina Otter āOperads and phylogenetic treesā Preprint In arXiv:1512.03337, 2015
- āDetermining the probability of smart grid attacks by combining attack tree and attack graph analysisā In International Workshop on Smart Grid Security, 2014, pp. 30ā47 Springer
- Andrea Bobbio, Lavinia Egidi and Roberta Terruggia āA methodology for qualitative/quantitative analysis of weighted attack treesā In IFAC Proceedings Volumes 46.22 Elsevier, 2013, pp. 133ā138
- āEvil twins: handling repetitions in attackādefense treesā In International Workshop on Graphical Models for Security, 2017, pp. 17ā37 Springer
- Tai-Danae Bradley āEntropy as a topological operad derivationā In Entropy 23.9 MDPI, 2021, pp. 1195
- Randal E. Bryant āGraph-based algorithms for boolean function manipulationā In Computers, IEEE Transactions on 100.8 IEEE, 1986, pp. 677ā691
- Randal E. Bryant āSymbolic boolean manipulation with ordered binary-decision diagramsā In ACM Computing Surveys (CSUR) 24.3 ACM New York, NY, USA, 1992, pp. 293ā318
- Carlos E Budde and MariĆ«lle Stoelinga āEfficient algorithms for quantitative attack tree analysisā In 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 2021, pp. 1ā15 IEEE
- Huiyu Dong, Hongwei Wang and Tao Tang āAn attack tree-based approach for vulnerability assessment of communication-based train control systemsā In 2017 Chinese Automation Congress (CAC), 2017, pp. 6407ā6412 IEEE
- Martin Doubek, Branislav Jurco and Lada Peksova āProperads and Homotopy Algebras Related to Surfacesā In arXiv preprint arXiv:1708.01195, 2017
- āA linear-time algorithm to find modules of fault treesā In IEEE Transactions on Reliability 45.3 IEEE, 1996, pp. 422ā425
- āEfficient attack-defense tree analysis using Pareto attribute domainsā In 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 2019, pp. 200ā20015 IEEE
- āOperads for complex system design specification, analysis and synthesisā In Proceedings of the Royal Society A 477.2250 The Royal Society Publishing, 2021, pp. 20210099
- āAttack trees with sequential conjunctionā In IFIP International Information Security and Privacy Conference, 2015, pp. 339ā353 Springer
- Parvaiz Ahmed Khand and Poong Hyun Seong āAn attack model development process for the cyber security of safety related nuclear digital I&C systemsā In Proceedings of the Korean Nucleary Society (KNS) Fall meeting, 2007
- āOn quantitative analysis of attackādefense trees with repeated labelsā In International Conference on Principles of Security and Trust, 2018, pp. 325ā346 Springer
- āFoundations of attackādefense treesā In International Workshop on Formal Aspects in Security and Trust, 2010, pp. 80ā95 Springer
- Rajesh Kumar, Enno Ruijters and MariĆ«lle Stoelinga āQuantitative attack tree analysis via priced timed automataā In International Conference on Formal Modeling and Analysis of Timed Systems, 2015, pp. 156ā171 Springer
- Nikolaos Limnios āFault treesā John Wiley & Sons, 2013
- Milan LopuhaƤ-Zwakenberg, Carlos E. Budde and MariĆ«lle Stoelinga āEfficient and Generic Algorithms for Quantitative Attack Tree Analysisā In IEEE Transactions on Dependable and Secure Computing, 2022, pp. 1ā18 DOI: 10.1109/TDSC.2022.3215752
- āAttack time analysis in dynamic attack trees via integer linear programmingā In arXiv preprint arXiv:2111.05114, 2021
- Martin Markl, Steven Shnider and James D Stasheff āOperads in algebra, topology and physicsā American Mathematical Society Providence, RI, 2002
- āFoundations of attack treesā In International Conference on Information Security and Cryptology, 2005, pp. 186ā198 Springer
- āTime-to-compromise model for cyber risk reduction estimationā In Quality of protection Springer, 2006, pp. 49ā64
- JosĆ© Meseguer āGeneral logicsā In Studies in Logic and the Foundations of Mathematics 129 Elsevier, 1989, pp. 275ā329
- Antoine Rauzy āNew algorithms for fault trees analysisā In Reliability Engineering & System Safety 40.3 Elsevier, 1993, pp. 203ā211
- āExact and truncated computations of prime implicants of coherent and non-coherent fault trees within Araliaā In Reliability Engineering & System Safety 58.2 Elsevier, 1997, pp. 127ā144
- Bruce Schneier āAttack treesā In Dr. Dobbās journal 24.12, 1999, pp. 21ā29
- Donald Yau āColored operadsā American Mathematical Society, 2016
- Donald Yau āOperads of wiring diagramsā Springer, 2018
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.