of the countermeasures employed by the defenders.
As future work, we aim to explore various direc-
tions from both theoretical and practical perspectives.
On the theoretical side, we intend to investigate sce-
narios where the game structure involves multiple at-
tackers. This presents a challenging objective due to
our current approach of transforming Attack Graphs
into interpreted systems. To address multiple attack-
ers, we must consider transforming multiple Attack
Graphs into interpreted systems. Currently, merging
several Attack Graphs has not yet been studied. Ini-
tially, we will delve into the amalgamation of multi-
ple Attack Graphs and subsequently devise a formal
framework for generating an interpreted system. On
the practical side, there is much to accomplish. Pri-
marily, we need to enhance our tool to handle multi-
ple defenders. Additionally, we must expand the ca-
pabilities of AG2IS on the specification side. Our cur-
rent implementation only defines a reachability objec-
tive for the attacker. Nonetheless, as demonstrated in
our work, incorporating more intricate temporal ob-
jectives can enhance the verification process. More-
over, our approach in this study involved utilizing two
existing tools for Attack Graph generation and verifi-
cation. However, since MulVal is an outdated tool
without active maintenance, we are considering de-
veloping a new Attack Graph generator. Furthermore,
MCMAS lacks certain extensions in terms of logics for
strategic reasoning. Thus, we have plans to extend it
with more robust logics that are particularly relevant
within the realm of cybersecurity.
ACKNOWLEDGEMENT
The first author is supported by the PRIN project
RIPER (No. 20203FFYLK).
REFERENCES
Alur, R., Henzinger, T. A., and Kupferman, O. (1997).
Alternating-time temporal logic. In FOCS97, pages
100–109.
Ammann, P., Wijesekera, D., and Kaushik, S. (2002).
Scalable, graph-based network vulnerability analysis.
CCS ’02, page 217–224. Association for Computing
Machinery.
Bartolomeo, S. D., Pister, A., Buono, P., Dunne, C., and
Fekete, J.-D. (2022). Six methods for transforming
layered hypergraphs to apply layered graph layout al-
gorithms. EuroVis 2022, 41(3).
Bryant, R. E. (1986). Graph-based algorithms for boolean
function manipulation. IEEE Trans. Computers,
35(8):677–691.
Bursztein, E. and Goubault-Larrecq, J. (2007). A logical
framework for evaluating network resilience against
faults and attacks. In ASIAN 2007, pages 212–227.
Springer.
Catta, D., Leneutre, J., and Malvone, V. (2023a). Attack
graphs & subset sabotage games. Intelligenza Artifi-
ciale, 17(1):77–88.
Catta, D., Leneutre, J., and Malvone, V. (2023b). Obstruc-
tion logic: A strategic temporal logic to reason about
dynamic game models. In ECAI 2023, pages 365–372.
Catta, D., Stasio, A. D., Leneutre, J., Malvone, V., and Mu-
rano, A. (2023c). A game theoretic approach to attack
graphs. In ICAART 2023, pages 347–354.
Durkota, K., Lis
´
y, V., Bosansk
´
y, B., and Kiekintveld,
C. (2015a). Approximate solutions for attack graph
games with imperfect information. In GameSec 2015,
pages 228–249. Springer.
Durkota, K., Lisy, V., Bo
ˇ
sansky, B., and Kiekintveld, C.
(2015b). Optimal network security hardening using
attack graph games. IJCAI’15, page 526–532. AAAI
Press.
Fagin, R., Halpern, J., Moses, Y., and Vardi, M. (1995).
Reasoning about Knowledge. MIT.
Ingols, K., Lippmann, R., and Piwowarski, K. (2006). Prac-
tical attack graph generation for network defense. In
ACSAC’06, pages 121–130.
Jha, S., Sheyner, O., and Wing, J. M. (2002). Two formal
analyses of attack graphs. In CSFW-15, pages 49–63.
Kaynar, K. (2016). A taxonomy for attack graph generation
and usage in network security. J. Inf. Secur. Appl.,
29(C):27–56.
Lomuscio, A. and Raimondi, F. (2006). MCMAS: A model
checker for multi-agent systems. In TACAS 2006,
pages 450–454.
Nguyen, T. H., Wright, M., Wellman, M. P., and Baveja,
S. (2017). Multi-stage attack graph security games:
Heuristic strategies, with empirical game-theoretic
analysis. MTD ’17, page 87–97.
Noel, S., Jajodia, S., O’Berry, B., and Jacobs, M. (2003).
Efficient minimum-cost network hardening via exploit
dependency graphs. In ACSAC 2003, page 86.
Ou, X., Boyer, W. F., and McQueen, M. A. (2006). A
scalable approach to attack graph generation. In CCS
2006, pages 336–345.
Ou, X., Govindavajhala, S., and Appel, A. W. (2005). Mul-
val: A logic-based network security analyzer. In
USENIX Security ’05’, page 8.
Phillips, C. and Swiler, L. P. (1998). A graph-based system
for network-vulnerability analysis. In NSPW 1998,
pages 71–79.
Sheyner, O., Haines, J., Jha, S., Lippmann, R., and Wing, J.
(2002). Automated generation and analysis of attack
graphs. pages 273– 284.
ICAART 2024 - 16th International Conference on Agents and Artificial Intelligence
132