<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Towards Visualising Security with Arguments</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Stefano</forename><surname>Bistarelli</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Matematica e Informatica</orgName>
								<orgName type="institution">Università di Perugia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">IIT-CNR</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fabio</forename><surname>Rossi</surname></persName>
							<email>rossi@dmi.unipg.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Matematica e Informatica</orgName>
								<orgName type="institution">Università di Perugia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Santini</surname></persName>
							<email>francesco.santini@iit.cnr.it</email>
							<affiliation key="aff1">
								<orgName type="institution">IIT-CNR</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Carlo</forename><surname>Taticchi</surname></persName>
							<email>taticchi]@dmi.unipg.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dipartimento di Matematica e Informatica</orgName>
								<orgName type="institution">Università di Perugia</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Towards Visualising Security with Arguments</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2EADB40EC182A208EE0C3ACBAA9E6D7F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T23:58+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Argumentation has been proved as a simple yet powerful approach to manage conflicts in reasoning with the purpose to find subsets of "surviving" arguments. Our intent is to exploit such form of resolution to visually support the administration of security in complex systems. For instance, in case threat countermeasures are in conflict (also with assets) and only some of them can be selected.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction and Motivations</head><p>An Abstract Argumentation Framework (AAF ), or System, as introduced in a seminal paper by Dung <ref type="bibr" target="#b5">[6]</ref>, is simply a pair A, R consisting of a set A whose elements are called arguments and of a binary relation R on A, called "attack" relation. An abstract argument is not assumed to have any specific structure but, roughly speaking, an argument is anything that may attack or be attacked by another argument. The sets of arguments (or extensions) to be considered are then defined under different semantics, which are related to varying degrees of scepticism or credulousness.</p><p>In this work, our goal is to start developing a tool to visualise security threats and related countermeasures as arguments, as if security was a continuous dynamic discussion between the administrator and the surveilled system. Existing automated tools to defend a system from such security threats are one potential solution, but a completely automated approach could undervalue the strong analytic capabilities of humans, particularly in problematic situations that require vigilant human oversight.</p><p>We measure the strength of subsets of arguments and single arguments in accordance with Argumentation Theory. We print such strength degrees in different colours with the purpose to immediately catch the attention of the Security Administrator on what is going on in his system, and help him to take a decision on the set of countermeasures to be considered.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>In this section we briefly summarise the background information related to classical Abstract Argumentation Frameworks (AAFs) <ref type="bibr" target="#b5">[6]</ref>. Argumentation semantics <ref type="bibr" target="#b5">[6]</ref> characterise a collective "acceptability" for arguments. Respectively, adm, com, prf , and stb stand for admissible, complete, preferred, and stable semantics.</p><formula xml:id="formula_0">Definition 2 (Semantics [6]). Let F = A, R be an AAF. A set S ⊆ A is conflict-free (in F), denoted S ∈ cf (F ), iff there are no a, b ∈ S, such that a b or b a ∈ R. For S ∈ cf (F ), it holds that -S ∈ adm(F ), if each a ∈ S is defended by S; -S ∈ com(F ), if S ∈ adm(F )</formula><p>and for each a ∈ A defended by S, a ∈ S holds; -S ∈ prf (F ), if S ∈ adm(F ) and there is no T ∈ adm(F ) with S ⊂ T ; -S ∈ stb(F ), if for each a ∈ A\S, S a;</p><p>We also recall that the requirements in Def. 2 define an inclusion hierarchy on the corresponding extensions, from the most to the least stringent: stb(F ) ⊆ prf (F ) ⊆ com(F ) ⊆ adm(F ). Moreover, σ(F ) = ∅ always holds for each considered semantics σ (except for the stable one).</p><p>Definition 3 (Arguments acceptance-state). Given one of the semantics σ in Def. 2 and a framework F , an argument a is i) sceptically accepted if ∀S ∈ σ(F ), a ∈ S, ii) a is credulously accepted if ∃S ∈ σ(F ), a ∈ S and a is not sceptically accepted, and iii) a is rejected if S ∈ σ(F ), a ∈ S.</p><formula xml:id="formula_1">Consider F = A, R in Fig. 1, with A = {a, b, c, d, e} and R = {a b, c b, c d, d c, d</formula><p>e, e e}. In F we have adm(F ) = {∅, {a}, {c}, {d}, {a, c}, {a, d}}, com(F ) = {{a}, {a, c}, {a, d}}, prf (F ) = {{a, d}, {a, c}}, and stb(F ) = {{a, d}}. Hence, argument a is sceptically accepted in com(F ), prf (F ) and stb(F ), while it is only credulously accepted in adm(F ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">A Visualisation Example</head><p>Consider a small research and development company. This company cooperates with other (often large) enterprises for the development of complex goods. Such company possesses high-tech knowledge which has to be protected from competitors. The company needs to efficiently use its resources with the purpose to survive in a highly competitive market. In short, the company has the goal (i.e., asset) of ensuring the productivity of operations (QoS).</p><p>In this small example, the security-system administrator has identified the following threats and related security controls (in square brackets): hacker penetration (HP) [host IDS (HI), network IDS (NI)] (where IDS stands for Intrusion Detection System), employee abuse (EA) [monitoring functionality (MF), audit procedures (AP)], and compromise of communication channel (CCC) [virtual private network (VPN), encrypted line (EL)].</p><p>We would like to emphasise that abstract arguments have no internal structure, and are not "directly linked" to classical logic. For this reason, we can consider multiple sources of information but and belief, such as case law, common sense, and expert opinion. We can consider information coming from multiple network-sensors, in the form of logs, warnings, and errors. Facts and beliefs can be also taken from internal policy documents, and standard documents as well. For instance the Standard of Good Practice for Information Security, is a business-focused, practical and comprehensive guide to identifying and managing information security risks in organizations and their supply chains. The 2011 Standard is aligned with the requirements for an Information Security Management System (ISMS) set out in ISO/IEC 27000-series standards, and provides wider and deeper coverage of ISOIEC 27002<ref type="foot" target="#foot_0">3</ref> control topics, as well as cloud computing, information leakage, consumer devices and security governance.</p><p>To work on our example we use SecArg<ref type="foot" target="#foot_1">4</ref> (Security with Arguments). SecArg is based on ConArg <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref> (ARGumentation with CONstraints), which is an Abstract Argumentation reasoning-tool using the Gecode library<ref type="foot" target="#foot_2">5</ref> , an efficient C++ environment where to develop constraint-based applications. The input (text) file passed to SecArg contains the list of arguments partitioned into countermeasures, threats, assets, and attacks between them: for instance, countermeasure(HI), threat(HP), att(HI,HP) (hacker penetration is prevented by a host IDS). SecArg visually represents the different nature of arguments with different colours: green for countermeasures, red for threats, and yellow for assets.</p><p>A more extended example is represented in Fig. <ref type="figure" target="#fig_1">2</ref>. In such AAF we have that executing a host IDS and a monitoring functionality on the same machine (i.e., HI&amp;MF) impacts on its QoS. Hence, we pose an attack between them, and we also consider not having HI (NotHI) or MF (NotMF). Moreover, we have some countermeasures in conflict, i.e., EL or VPN, and MF.</p><p>We obtain three stable extensions (we use the stable semantics because it is the most sceptical one, see Sec. 2): i) {AP, VPN, EL, HI, NI, NotMF, QoS}, ii) {AP, VPN, EL, HI, NI, HI&amp;MF}, and iii) {AP, VPN, EL, NI, NotHI, NotMF, QoS}. In this case, reasoning in terms of stable or preferred semantics is the same, since they both returns the same three extensions. Reasoning on the scep-  tical acceptance of arguments in such three extensions, we obtain that AP, VPN, EL, NI are sceptically accepted (i.e., "always"). This means that, for the attack-/countermeasure scenario we have depicted, having audit procedures, a virtual private network, an encrypted line, and a network IDS is always considered a valid argument. Therefore, they correspond to a strong suggestion for the security administrator. On the other hand, there are some other arguments that are rejected (see Def. 3), that is they never appear in such extensions; for instance EA, HP, MF, and CCC. All three threats are successfully "avoided", in the sense that adopted security countermeasures always prevent all of them. Moreover, also adopting the monitoring functionality countermeasure is not a good idea given this scenario, since it is rejected as well. Finally, the remaining arguments appear sometimes but not always in such three extensions (they are credulously accepted, according to Def. 3): NotHI (in 1 extension), HI&amp;MF (1), HI (2), NotMF (2), QoS <ref type="bibr" target="#b1">(2)</ref>. The number of times they appear is visually highlighted in SecArg by filling arguments with different shades of grey, and also returning the appearance ratio, e.g,. 66.6% for QoS and 33.3% for NotHI. This can be interpreted as a strength-score for these arguments: for instance, having an host IDS beats not having it (2 to 1): hence the administrator is recommended to use it. For the sake of presentation, in Fig. <ref type="figure" target="#fig_2">3</ref> we use thick continuous circles for sceptically accepted arguments, thin/thick dotted circles for credulously accepted ones (respectively for lower/higher ratio of appearance, e.g., QoS is thicker than NotHI), and light-grey circles for rejected arguments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Related and Future Work</head><p>Since the application of Argumentation to Cybersecurity-related issues is relatively a new field (or, at least, not deeply investigated), there is a few related work to be mentioned. A bunch of works applying Argumentation-based conflictresolution to the specific case of firewall rules are <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. In our approach, however, we would like to provide a general reasoning-tool.</p><p>In <ref type="bibr" target="#b7">[8]</ref> the authors suggest the use of Argumentation to provide automated support for Cybersecurity decisions. Three different tasks where Argumentation can contribute are surveyed in the paper: first, the establishment of a security policy, drawing from a range of information on best practice and taking into account likely attacks and the vulnerability of the system to those attacks. Secondly, the process diagnosis to determine if an attack is underway after some apparent anomaly in system operation is detected; the final goal is to decide what action, if any, should be taken to ensure system integrity. At last, Argumentation can be used to reconfigure a security policy in the aftermath of a successful attack: this reconfiguration needs to ensure protection against future similar-attacks, without creating new vulnerabilities.</p><p>In <ref type="bibr" target="#b6">[7]</ref> the authors propose how arguments can support the decision making process: the aim is to help the system security administrator to react (or not) to possible ongoing attacks. For instance, a decision can be taken either to disable traffic through port 80 or not to disable it.</p><p>In the next future we would like to extend SecArg from both the theoretical and practical point of view by i) interactively changing the AAF with a new node or attack and immediately see how much such modification impacts on the strength of arguments; ii) selecting a subset S of arguments and get the minimal amount of change to the AAF that transforms S into an extension satisfying a given semantics (e.g., preferred).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 :</head><label>1</label><figDesc>Fig. 1: An example of AAF.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 :</head><label>2</label><figDesc>Fig. 2: The AAF with controls, threats (horizontal filling), and QoS asset.</figDesc><graphic coords="4,139.51,115.94,163.24,125.42" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 :</head><label>3</label><figDesc>Fig. 3: Sceptically (thick), credulously (dotted) accepted, rejected (grey).</figDesc><graphic coords="4,310.07,116.02,164.55,125.61" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">ISO, ISO, and I. E. C. Std. "ISO 27002: 2005." Information Technology-Security Techniques-Code of Practice for Information Security Management. ISO (2005).</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_1">http://www.dmi.unipg.it/secarg</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_2">http://www.gecode.org</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Arguing about firewall policy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Applebaum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">N</forename><surname>Levitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rowe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parsons</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">COMMA. Frontiers in Artificial Intelligence and Applications</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Verheij</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Szeider</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Woltran</surname></persName>
		</editor>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">245</biblScope>
			<biblScope unit="page" from="91" to="102" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Using argumentation logic for firewall policy specification and analysis</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Bandara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Kakas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">C</forename><surname>Lupu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Russo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">DSOM. LNCS</title>
		<editor>State, R., van der Meer, S., O&apos;Sullivan, D., Pfeifer, T.</editor>
		<imprint>
			<biblScope unit="volume">4269</biblScope>
			<biblScope unit="page" from="185" to="196" />
			<date type="published" when="2006">2006</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Using argumentation logic for firewall configuration management</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Bandara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Kakas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">C</forename><surname>Lupu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Russo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Integrated Network Management</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="180" to="187" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Benchmarking hard problems in random abstract AFs: The stable semantics</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Rossi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computational Models of Argument -Proceedings of COMMA. FAIA</title>
				<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">266</biblScope>
			<biblScope unit="page" from="153" to="160" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A first comparison of abstract argumentation reasoning-tools</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bistarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Rossi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ECAI 2014 -21st European Conference on Artificial Intelligence</title>
				<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">263</biblScope>
			<biblScope unit="page" from="969" to="970" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Dung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="321" to="357" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Debating cybersecurity or securing a debate? -(position paper)</title>
		<author>
			<persName><forename type="first">F</forename><surname>Martinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Santini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Foundations and Practice of Security -7th International Symposium, FPS 2014</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">8930</biblScope>
			<biblScope unit="page" from="239" to="246" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Argumentation logic to assist in security administration</title>
		<author>
			<persName><forename type="first">J</forename><surname>Rowe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Levitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Parsons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Sklar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Applebaum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jalal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2012 Workshop on New Security Paradigms</title>
				<meeting>the 2012 Workshop on New Security Paradigms</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="43" to="52" />
		</imprint>
	</monogr>
	<note>NSPW &apos;12</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
