Mitigating Security Risks Through Attack Strategies Exploration

  • Braham Lotfi MediouniEmail author
  • Ayoub Nouri
  • Marius Bozga
  • Axel Legay
  • Saddek Bensalem
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11245)


Security assessment of organization’s information systems is becoming increasingly complex due to their growing sizes and underlying architectures, e.g., cloud. Analyzing potential attacks is a pragmatic approach that provides insightful information to achieve this purpose. In this work, we propose to synthesize defense configurations to counter sophisticated attack strategies minimizing resource usage while ensuring a high probability of success. For this, we combine Statistical Model Checking techniques with Genetic Algorithms. Experiments performed on real-life case studies show substantial improvements compared to existing techniques.

Supplementary material


  1. 1.
    Baker, G.H., Berg, A.: Supervisory control and data acquisition (SCADA) systems. Crit. Infrastruct. Prot. Rep. 1(6), 5–6 (2002)Google Scholar
  2. 2.
    Butts, J.W., Mills, R.F., Baldwin, R.O.: Developing an insider threat model using functional decomposition. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 412–417. Springer, Heidelberg (2005). Scholar
  3. 3.
    Convery, S., Cook, D., Franz, M.: An Attack Tree for the Border Gateway Protocol. Cisco Internet Draft (2002)Google Scholar
  4. 4.
    Edge, K.S., Dalton, G.C., Raines, R.A., Mills, R.F.: Using attack and protection trees to analyze threats and defenses to homeland security. In: Military Communications Conference, MILCOM 2006, pp. 1–7. IEEE (2006)Google Scholar
  5. 5.
    Gadyatskaya, O., Hansen, R.R., Larsen, K.G., Legay, A., Olesen, M.C., Poulsen, D.B.: Modelling attack-defense trees using timed automata. In: Fränzle, M., Markey, N. (eds.) FORMATS 2016. LNCS, vol. 9884, pp. 35–50. Springer, Cham (2016). Scholar
  6. 6.
    Hérault, T., Lassaigne, R., Magniette, F., Peyronnet, S.: Approximate probabilistic model checking. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 73–84. Springer, Heidelberg (2004). Scholar
  7. 7.
    Sans ICS: Analysis of the cyber attack on the Ukrainian power grid (2016). Accessed 25 Apr 2018Google Scholar
  8. 8.
    Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack–defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80–95. Springer, Heidelberg (2011). Scholar
  9. 9.
    Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2005). Scholar
  10. 10.
    Mediouni, B.L., Niar, S., Benmansour, R., Benatchba, K., Koudil, M.: A bi-objective heuristic for heterogeneous MPSoC design space exploration. In: 2015 10th International Design & Test Symposium (IDT), pp. 90–95. IEEE (2015)Google Scholar
  11. 11.
    Roy, A., Kim, D.S., Trivedi, K.S.: Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Secur. Commun. Netw. 5(8), 929–943 (2012)CrossRefGoogle Scholar
  12. 12.
    Wang, P., Lin, W.-H., Kuo, P.-T., Lin, H.-T., Wang, T.C.: Threat risk analysis for cloud security based on attack-defense trees. In: ICCM, pp. 106–111 (2012)Google Scholar
  13. 13.
    Younes, H.L.S.: Verification and planning for stochastic processes with asynchronous events. Ph.D. thesis, Carnegie Mellon (2005)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Braham Lotfi Mediouni
    • 1
    Email author
  • Ayoub Nouri
    • 1
  • Marius Bozga
    • 1
  • Axel Legay
    • 2
  • Saddek Bensalem
    • 1
  1. 1.University Grenoble Alpes, CNRS, Grenoble INP (Institute of Engineering University Grenoble Alpes), VERIMAGGrenobleFrance
  2. 2.InriaRennesFrance

Personalised recommendations