An Extension of Attack Trees

  • Yi-Chih Kao
  • Yuan-Ping Hwang
  • Shih-Chen Wang
  • Sheng-Lung Peng
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 733)


Attack trees provide a model to describe the security of a system based on the possibility of various attacks. In this paper, we propose the concept of “attack graphs” as an extension of attack trees, wherein directed acyclic graphs are used to depict possible attacks on a system. By deploying this model, system managers can discern all possible threats to the system and thus are more likely to design efficient countermeasures to thwart those attacks. Within this model, we also propose the concept of the most dangerous path in the attack graph, and finally propose an algorithm to expose it.


Attack trees Directed acyclic graph Attack graph The most dangerous path 



This work was partially supported by the Ministry of Science and Technology of Taiwan, under Contract No. MOST 106-2221-E-259-005.


  1. 1.
    Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)Google Scholar
  2. 2.
    Odubiyi, J.B., O’Brien, C.W.: Information security attack tree modeling. In: Proceedings of Seventh Workshop on Education in Computer Security (WECS), pp. 29–37 (2006)Google Scholar
  3. 3.
    Shooman, M.L.: Probabilistic Reliability: An Engineering Approach. McGraw-Hill Book Company, New York (1968)zbMATHGoogle Scholar
  4. 4.
    Anderson, R.: Why cryptosystems fail. In: Proceedings of the 1st ACM Conference on Computer and Communications Security (1993)Google Scholar
  5. 5.
    SANS Internet Storm Center.
  6. 6.
  7. 7.
    Ray, H.T., Vemuri, R., Kantubhukta, H.R.: Toward an automated attack model for red teams. IEEE Secur. Priv. 3(4), 18–24 (2005)CrossRefGoogle Scholar
  8. 8.
    Horowitz, E., Sahni, S., Mehta, D.P.: Fundamentals of Data Structures in C++, 2nd edn. Silicon Press, New York (2007)Google Scholar
  9. 9.
    Weiss, M.A.: Data Structures and Algorithm Analysis in C, 3rd edn. (2007)Google Scholar
  10. 10.
    Diestel, R.: Graph Theory. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  11. 11.
    West, D.B.: Introduction to Graph Theory. Prentic-Hall Inc., Upper Saddle River (2001)Google Scholar
  12. 12.
    Skiena, S.S.: The Algorithm Design Manual, 2nd edn. Springer-Verlag, London (2008)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Yi-Chih Kao
    • 1
  • Yuan-Ping Hwang
    • 2
  • Shih-Chen Wang
    • 2
  • Sheng-Lung Peng
    • 2
  1. 1.Information Technology and Service CenterNational Chiao Tung UniversityHsinchuTaiwan
  2. 2.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Personalised recommendations