Regression nodes: Extending attack trees with data from social sciences

JWH Bullee, AL Montoya Morales, W Pieters, M. Junger, P.H. Hartel

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)

    Abstract

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to succeed. This logic, however, is not suitable for including human interaction such as that of social engineering, because the attacker may combine different persuasion principles to different degrees, with different associated success probabilities. Experimental results in this domain are typically represented by regression equations rather than logical gates. This paper therefore proposes an extension to attack trees involving a regression-node, illustrated by data obtained from a social engineering experiment. By allowing the annotation of leaf nodes with experimental data from social science, the regression-node enables the development of integrated socio-technical security models.
    Original languageEnglish
    Title of host publicationProceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015)
    EditorsG Bella, G Lenzine
    Place of PublicationPiscataway
    PublisherIEEE Society
    Pages17-23
    Number of pages7
    ISBN (Print)978-1-5090-0178-1
    DOIs
    Publication statusPublished - 2015
    EventProceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015),Verona, Italy - Piscataway
    Duration: 13 Jul 201513 Jul 2015

    Publication series

    Name
    PublisherIEEE

    Conference

    ConferenceProceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015),Verona, Italy
    Period13/07/1513/07/15

    Bibliographical note

    http://www.computer.org/csdl/proceedings/stast/2015/0178/00/0178z003.pdf

    Keywords

    • CSdevelopingscience

    Fingerprint

    Dive into the research topics of 'Regression nodes: Extending attack trees with data from social sciences'. Together they form a unique fingerprint.

    Cite this