Exploring attack graph for cost-benefit security hardening: A probabilistic approach

被引:82
|
作者
Wang, Shuzhen [1 ]
Zhang, Zonghua [1 ]
Kadobayashi, Youki [1 ]
机构
[1] Xidian Univ, Sch Comp Sci, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
Security management; Vulnerability analysis; Risk assessment; Attack graph; Security hardening; Security metrics; VULNERABILITY; SYSTEM;
D O I
10.1016/j.cose.2012.09.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing complexity of today's computer systems, together with the rapid emergence of novel vulnerabilities, make security hardening a formidable challenge for security administrators. Although a large variety of tools and techniques are available for vulnerability analysis, the majority work at system or network level without explicit association with human and organizational factors. This article presents a middleware approach to bridge the gap between system-level vulnerabilities and organization-level security metrics, ultimately contributing to cost-benefit security hardening. In particular, our approach systematically integrates attack graph, a commonly used effective approach to representing and analyzing network vulnerabilities, and Hidden Markov Model (HMM) together, for exploring the probabilistic relation between system observations and states. More specifically, we modify and apply dependency attack graph to represent network assets and vulnerabilities (observations), which are then fed to HMM for estimating attack states, whereas their transitions are driven by a set of predefined cost factors associated with potential attacks and countermeasures. A heuristic searching algorithm is employed to automatically infer the optimal security hardening through cost-benefit analysis. We use a synthetic network scenario to illustrate our approach and evaluate its performance through a set of simulations. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:158 / 169
页数:12
相关论文
共 50 条
  • [1] Optimal security hardening on attack tree models of networks: a cost-benefit analysis
    Rinku Dewri
    Indrajit Ray
    Nayot Poolsappasit
    Darrell Whitley
    [J]. International Journal of Information Security, 2012, 11 : 167 - 188
  • [2] Optimal security hardening on attack tree models of networks: a cost-benefit analysis
    Dewri, Rinku
    Ray, Indrajit
    Poolsappasit, Nayot
    Whitley, Darrell
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (03) : 167 - 188
  • [3] Optimal Security Hardening over a Probabilistic Attack Graph
    Buczkowski, Przemyslaw
    Malacaria, Pasquale
    Hankin, Chris
    Fielder, Andrew
    [J]. SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 21 - 30
  • [4] Security attribute evaluation method: A cost-benefit approach
    Butler, SA
    [J]. ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2002, : 232 - 240
  • [5] COST-BENEFIT APPROACH
    WILLIAMS, A
    [J]. BRITISH MEDICAL BULLETIN, 1974, 30 (03) : 252 - 256
  • [6] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
    GAO Ni
    HE Yiyue
    [J]. Wuhan University Journal of Natural Sciences, 2018, 23 (02) : 171 - 177
  • [7] Probabilistic social cost-benefit analysis for green roofs: A lifecycle approach
    Bianchini, Fabricio
    Hewage, Kasun
    [J]. BUILDING AND ENVIRONMENT, 2012, 58 : 152 - 162
  • [8] A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies
    Shim, Woohyun
    Massacci, Fabio
    Tedeschi, Alessandra
    Pollini, Alessandro
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 514 - 522
  • [9] Approach to a Bayesian decision model for cost-benefit analysis in security risk
    Lichte, D.
    Wolf, K. -D.
    [J]. SAFETY AND RELIABILITY - SAFE SOCIETIES IN A CHANGING WORLD, 2018, : 1819 - 1826
  • [10] VOIP SECURITY: A PERFORMANCE AND COST-BENEFIT ANALYSIS
    Perigo, Levi
    Gandotra, Rahil
    Gedia, Dewang
    Hussain, Moiz
    Gupta, Praniti
    Bano, Shirin
    Kulkarni, Vineet
    [J]. INFORMATION TECHNOLOGY IN INDUSTRY, 2020, 8 (02): : 34 - 42