Skip to content
salman- edited this page Jun 3, 2017 · 6 revisions

Welcome to the A-ADTree wiki!

What are the shortcomings of current Attack-Defense Tree?

The ADTree is a top-down approach to show how a threat agent chooses his actions in order to obtain a specific goal. The current version of Attack-Defense Tree does not support the following concepts:

  • Assets
  • Threat Agent
  • Vulnerabilities of the Assets

During this approach, the threat agent may try to perform an attack on different assets. The ADTree does not provide any kind of information about the assets, and their values to the companies.Also, there is a need to manage the vulnerabilities on these assets. In this way, we can evaluate the priority of vulnerability based on the cost of damage of each vulnerability. Additionally, the current ADTree does not distinguish between different threat agent who performs the attacks. But, we know that the success of attack could somehow depend on the abilities of the threat agent.

Also, current ADTree does not measure

  • Likelihood of a risk is not evaluated
  • Effect of countermeasure

Every risk includes two main concepts which are uncertainty and cost of damage of the attack. The current ADTree does not evaluate the likelihood of the risk. Additionally, project managers are interested to compare the effectiveness of the different countermeasure solutions over a specific problem. Therefore, they can choose the countermeasure which mitigates the risk more, or is more cost efficient.

What is A-ADTree project?

A-ADTree is a project based on Attack-Defense Tree, but we added the asset, vulnerability, and threat agent concepts into the current ADTree in order to fix the stated shortcomings. During this project, we did three main contributions as below:

The below table shows the comparison between the potentiality of ADTree, and A-ADTreeA-ADTree vs ADTree

This project has been done as a master thesis at the University of Tartu. The complete thesis can be found here.