sures for security, based on conditioned probability,
are defined in (Roy et al., 2012). We plan to use AT
as an high-level model to represent the attack mode
and generate the corresponding DBN.
REFERENCES
Bobbio, A., Franceschinis, G., Gaeta, R., and Portinale,
L. (2003). Parametric fault tree for the dependability
analysis of redundant systems and its high-level Petri
net semantics. IEEE Transactions on Software Engi-
neering, 29(3):270–287.
Byres, J., Franz, M., and Miller, D. (2004). The use of
attack trees in assessing vulnerabilities in SCADA
systems. In International Infrastructure Survivability
Workshop, Lisbon.
Codetta, D. (2005). Extended Fault Trees Analysis sup-
ported by Stochastic Petri Nets. PhD thesis, Dipar-
timento di Informatica, Universit`a di Torino.
Codetta, D. (2013). Generalized fault trees: from reliability
to security. Technical report, DiSIT, Istituto di Infor-
matica, Universit`a del Piemonte Orientale.
Codetta, D., Franceschinis, G., and Gribaudo, M. (2006).
Defining formalisms and models in the Draw-Net
Modelling System. In International Workshop on
Modelling of Objects, Components and Agents, pages
123–144, Turku, Finland.
Codetta, D., Franceschinis, G., Iacono, M., and Vittorini,
V. (2004). Repairable Fault Tree for the automatic
evaluation of repair policies. In International Con-
ference on Dependable Systems and Networks, pages
659–668, Florence, Italy. IEEE.
Dacier, M. and Deswarte, Y. (1994). Privilege graph: an ex-
tension to the typed access matrix model. In Computer
Security, pages 319–334. Springer.
Dacier, M., Deswarte, Y., and Kaˆaniche, M. (1996a). Mod-
els and tools for quantitative assessment of operational
security. Information systems security, pages 177–
186.
Dacier, M., Deswarte, Y., and Kaˆaniche, M. (1996b). Quan-
titative assessment of operational security: Models
and tools. Information Systems Security.
Dugan, J. B., Bavuso, S. J., and Boyd, M. A. (1992). Dy-
namic Fault-Tree Models for Fault-Tolerant Computer
Systems. IEEE Transactions on Reliability, 41:363–
377.
Frigault, M., Wang, L., Singhal, A., and Jajodia, S. (2008).
Measuring network security using dynamic bayesian
network. In Workshop on Quality of protection, pages
23–30. ACM.
Gupta, V., Lam, V., Ramasamy, H. V., Sanders, W. H.,
and Singh, S. (2003). Dependability and performance
evaluation of intrusion-tolerant server architectures.
In Dependable Computing, pages 81–101. Springer.
Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L.,
Wang, Y., Wang, X., and Stakhanova, N. (2007). Soft-
ware fault tree and coloured petri net–based specifica-
tion, design and implementation of agent-based intru-
sion detection systems. International Journal of In-
formation and Computer Security, 1(1):109–142.
Kordy, B., Mauw, S., Radomirovi´c, S., and Schweitzer, P.
(2011). Foundations of attack–defense trees. Formal
Aspects of Security and Trust, pages 80–95.
Langseth, H. and Portinale, L. (2007). Bayesian Net-
works in reliability. Reliability Engineering and Sys-
tem Safety, 92:92–108.
LeMay, E., Ford, M. D., Keefe, K., Sanders, W. H., and
Muehrcke, C. (2011). Model-based security metrics
using adversary view security evaluation (advise). In
International Conference on Quantitative Evaluation
of Systems, pages 191–200. IEEE.
MATFIA project (2000-2003). Malicious-and
accidental-fault tolerance for internet applica-
tions. http://research.cs.ncl.ac.uk/cabernet/
www.laas.research.ec.org/maftia/.
McDermott, J. P. (2000). Attack Net Penetration Testing. In
Workshop on New security paradigms.
Portinale, L., Bobbio, A., Codetta-Raiteri, D., and Mon-
tani, S. (2007). Compiling dynamic fault trees into
dynamic Bayesian nets for reliability analysis: The
Radyban tool. CEUR Workshop Proceedings, 268.
Rauzy, A. (1993). New Algorithms for Fault Trees
Analysis. Reliability Engineering & System Safety,
05(59):203–211.
Roy, A., Kim, D. S., and Trivedi, K. S. (2012). Attack coun-
termeasure trees (ACT): towards unifying the con-
structs of attack and defense trees. Security and Com-
munication Networks.
Sahner, R., Trivedi, K., and Puliafito, A. (1996). Perfor-
mance and Reliability Analysis of Computer Systems;
An Example-based Approach Using the SHARPE Soft-
ware Package. Kluwer Academic Publisher.
Sanders, W. and Meyer, J. (2001). Stochastic activity
networks: Formal definitions and concepts. Lecture
Notes in Computer Science, 2090:315–343.
Schneier, B. (1999). Attack trees. Dr. Dobb Journal of
Software Tools, 24(12):21–29.
Ten, P. C.-W., Liu, C.-C., and Govindarasu, M. (2007).
Vulnerability assessment of cybersecurity for SCADA
systems using attack trees. In Power Engineering So-
ciety General Meeting, pages 1–8.
Xie, P., Li, J. H., Ou, X., Liu, P., and Levy, R. (2010). Us-
ing bayesian networks for cyber security analysis. In
International Conference on Dependable Systems and
Networks, pages 211–220. IEEE.
Zhang, S. and Song, S. (2011). A novel attack graph poste-
rior inference model based on bayesian network. Jour-
nal of Information Security, 2(1):8–27.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
614