An algorithm for probabilistic least-commitment planning
AAAI'94 Proceedings of the twelfth national conference on Artificial intelligence (vol. 2)
Planning under uncertainty: structural assumptions and computational leverage
New directions in AI planning
A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Survivability analysis of networked systems
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
STATL: an attack language for state-based intrusion detection
Journal of Computer Security
Opponent Modeling in Multi-Agent Systems
IJCAI '95 Proceedings of the Workshop on Adaption and Learning in Multi-Agent Systems
ECP '99 Proceedings of the 5th European Conference on Planning: Recent Advances in AI Planning
Two Formal Analys s of Attack Graphs
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Reasoning About Others: Representing and Processing Infinite Belief Hierarchies
ICMAS '00 Proceedings of the Fourth International Conference on MultiAgent Systems (ICMAS-2000)
OBDD-based universal planning for synchronized agents in non-deterministic domains
Journal of Artificial Intelligence Research
Partial-order planning with concurrent interacting actions
Journal of Artificial Intelligence Research
Assessing procedural risks and threats in e-voting: challenges and an approach
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Misconfigurations discovery between distributed security components using the mobile agent approach
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Procedural security analysis: A methodological approach
Journal of Systems and Software
An evolutionary approach in threats detection for distributed security defence systems
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Janus: a two-sided analytical model for multi-stage coordinated attacks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Hi-index | 0.01 |
In this paper, we propose a formal model of coordinated attacks in which several attackers cooperate towards a common malicious goal. The model investigates both attack planning and vulnerability analysis, thereby providing a uniform approach to system and adversary modelling. In addition, the model is general enough to explain both coordinated and single attacks. In the paper, we define the notion of coordinated-attack graph, propose an algorithm for efficient generation of coordinated-attack graphs, demonstrate how coordinated-attack can be used for vulnerability analysis, and discuss an implementation of a coordinated-attack graph. Coordinated-attack graphs can facilitate a wide range of tasks, such as model checking, opponent modelling, intrusion response, sensor configuration, and so forth. In addition, they can be used in robotic warfare, where several intelligent software agents automatically produce and launch coordinated attacks.