Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3463952.3464225acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
demonstration

ADT2AMAS: Managing Agents in Attack-Defence Scenarios

Published: 03 May 2021 Publication History

Abstract

Expressing attack-defence trees (ADTrees) in a multi-agent setting allows for studying a new aspect of security scenarios, namely how the number of agents and their task assignment impact the performance of attacking and defending strategies executed by agent coalitions. Our tool ADT2AMAS allows for transforming ADTrees into extended asynchronous multi-agent systems and computing an optimal schedule with the minimal number of agents. ADT2AMAS is integrated within the graphical verification platform CosyVerif, but can also be run standalone.

References

[1]
[n.d.]. ADT2AMAS Minimal Scheduling. https://depot.lipn.univ-paris13.fr/parties/publications/minimal-scheduling.
[2]
[n.d.]. CosyVerif. https://www.cosyverif.org.
[3]
[n.d.]. IMITATOR. https://www.imitator.fr.
[4]
Jaime Arias, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Teofil Sidoruk, and Marië lle Stoelinga. 2020. Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems. In 22nd International Conference on Formal Engineering Methods, ICFEM 2020, Singapore, Singapore, March 1--3, 2021 (LNCS, Vol. 12531). Springer, 3--19. https://doi.org/10.1007/978--3-030--63406--3_1
[5]
Jaime Arias, Wojciech Penczek, Laure Petrucci, and Teofil Sidoruk. [n.d.] a. ADT2AMAS. https://depot.lipn.univ-paris13.fr/parties/tools/adt2amas.
[6]
Jaime Arias, Wojciech Penczek, Laure Petrucci, and Teofil Sidoruk. [n.d.] b. ADT2AMAS Alligator Service. https://depot.lipn.univ-paris13.fr/cosyverif/services/service-adt2amas .
[7]
Jaime Arias, Laure Petrucci, Wojciech Penczek, and Teofil Sidoruk. 2021. Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees. https://arxiv.org/abs/2101.06838
[8]
Zaruhi Aslanyan and Flemming Nielson. 2015. Pareto Efficient Solutions of Attack-Defence Trees. In Proceedings of the 4th Conference on Principles of Security and Trust, POST 2015, London, UK, April 11--18, 2015. Springer, 95--114.
[9]
Gerd Behrmann, Alexandre David, Kim Guldstrand Larsen, John Håkansson, Paul Pettersson, Wang Yi, and Martijn Hendriks. 2006. UPPAAL 4.0. In Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 11--14 September 2006, Riverside, California, USA. IEEE Computer Society, 125--126.
[10]
Ahto Buldas, Peeter Laud, Jaan Priisalu, Mart Saarepera, and Jan Willemson. 2006. Rational Choice of Security Measures Via Multi-parameter Attack Trees. In Critical Information Infrastructures Security. Springer, 235--248.
[11]
Barbara Fila and Wojciech Widel. 2020. Exploiting Attack-Defense Trees to Find an Optimal Set of Countermeasures. In Proceedings of the 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22--26, 2020. IEEE, 395--410.
[12]
Wojciech Jamroga, Wojciech Penczek, Piotr Dembinski, and Antoni Mazurkiewicz. 2018. Towards Partial Order Reductions for Strategic Ability. In Proceedings of the 17th International Conference on Autonomous Agents and Multi-agent Systems, AAMAS '18, Stockholm, Sweden, July 10--15, 2018. ACM, 156--165.
[13]
Wojciech Jamroga, Wojciech Penczek, Teofil Sidoruk, Piotr Dembinski, and Antoni W. Mazurkiewicz. 2020. Towards Partial Order Reductions for Strategic Ability. J. Artif. Intell. Res., Vol. 68 (2020), 817--850. https://doi.org/10.1613/jair.1.11936
[14]
Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sa$checkmathrms $a Radomirović, and Rolando Trujillo-Rasua. 2015. Attack Trees with Sequential Conjunction. In ICT Systems Security and Privacy Protection. Springer, 339--353.
[15]
Barbara Kordy, Sjouke Mauw, Sacheckmathrmsa Radomirović, and Patric Schweitzer. 2011. Foundations of Attack-Defense Trees. In FAST 2010 (LNCS, Vol. 6561). Springer, 80--95.
[16]
Barbara Kordy, Ludovic Piètre-Cambacédès, and Patrick Schweitzer. 2014. DAG-based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review, Vol. 13--14 (2014), 1--38.
[17]
Rajesh Kumar, Stefano Schivo, Enno Ruijters, Bucheckmathrmgra Mehmet Yildiz, David Huistra, Jacco Brandt, Arend Rensink, and Mariëlle Stoelinga. 2018. Effective Analysis of Attack Trees: A Model-Driven Approach. In Fundamental Approaches to Software Engineering. Springer, 56--73.
[18]
Yu-Kwong Kwok and Ishfaq Ahmad. 1999. Static Scheduling Algorithms for Allocating Directed Task Graphs to Multiprocessors. ACM Computing Surveys, Vol. 31, 4 (1999), 406--471.
[19]
Michele Lombardi, Michela Milano, Martino Ruggiero, and Luca Benini. 2010. Stochastic allocation and scheduling for conditional task graphs in multi-processor systems-on-chip. J. Sched., Vol. 13, 4 (2010), 315--345.
[20]
Sjouke Mauw and Martijn Oostdijk. 2006. Foundations of Attack Trees. In ICISC 2005. Springer, 186--198.
[21]
Laure Petrucci, Michal Knapik, Wojciech Penczek, and Teofil Sidoruk. 2019. Squeezing State Spaces of (Attack-Defence) Trees. In 24th International Conference on Engineering of Complex Computer Systems, ICECCS 2019, Guangzhou, China, November 10--13, 2019. IEEE, 71--80.
[22]
Khushboo Singh, Mahfooz Alam, and Sushil Kumar. 2015. A Survey of Static Scheduling Algorithm for Distributed Computing System. International Journal of Computer Applications, Vol. 129 (11 2015), 25--30.
[23]
Chris Slater, O. Sami Saydjari, Bruce Schneier, and Jim Wallner. 1998. Toward a Secure System Engineering Methodolgy. In NSPW'98. ACM, 2--10. https://doi.org/10.1145/310889.310900
[24]
Michael J. Wooldridge. 2002. An Introduction to Multiagent Systems. John Wiley & Sons.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AAMAS '21: Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems
May 2021
1899 pages
ISBN:9781450383073

Sponsors

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 03 May 2021

Check for updates

Author Tags

  1. asynchronous multi-agent systems
  2. attack-defence trees
  3. scheduling

Qualifiers

  • Demonstration

Funding Sources

  • French National Centre for Scientific Research Polish Academy of Sciences
  • National Centre for Research and Development Poland Luxembourg National Research Fund

Conference

AAMAS '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 32
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media