Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

被引:0
|
作者
Bhuiyan, Tanveer Hossain [1 ]
Nandi, Apurba K. [1 ]
Medal, Hugh [1 ]
Halappanavar, Maltantcsh [2 ]
机构
[1] Mississippi State Univ, Dept Ind & Syst Engn, POB 9542, Mississippi State, MS 39762 USA
[2] Pacific North West Natl Lab, Phys & Computat Sci Directorate, 902 Battelle Blvd,POB 999, Richland, WA 99354 USA
关键词
attack graph; two-stage stochastic programming; mixed-integer programming;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations are being hit by small and large multi-stage cyber-attacks every day. One tool for integrating and analyzing many potential multi-stage attacks is the attack graph. Nodes of an attack graph represent attack states, and the arcs represent atomic attacks. The attack graph as a whole represents all the potential attack paths to compromise target nodes beginning from a set of initially vulnerable nodes. Given a limited budget, finding an optimal subset of arcs in the attack graph is an important problem in seeking to optimally deploy security countermeasures to minimize risks associated with potential cyber-attacks. In this research, we develop a stochastic network interdiction model based on a probabilistic attack graph with uncertain attack success probabilities on arcs and formulate it as a two-stage stochastic mixed-integer linear program. We employ the sample average approximation scheme in conjunction with Benders decomposition approach to solve the resulting problem. Our model provides an optimal recommendation for countermeasure deployment in a stochastic environment. Results demonstrate the value of stochastic solutions and the variation of risk with the accuracy of estimates of attack success probabilities.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks
    Mousavian, Seyedamirabbas
    Valenzuela, Jorge
    Wang, Jianhui
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (01) : 156 - 165
  • [2] Probabilistic modeling and analysis of sequential cyber-attacks
    Liu, Qisi
    Xing, Liudong
    Zhou, Chencheng
    [J]. ENGINEERING REPORTS, 2019, 1 (04)
  • [3] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [4] From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment
    Foglietta, Chiara
    Masucci, Dario
    Palazzo, Cosimo
    Santini, Riccardo
    Panzieri, Stefano
    Rosa, Luis
    Cruz, Tiago
    Lev, Leonid
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 424 - 435
  • [5] A Control and Attack Detection Scheme for Fuzzy Systems against Cyber-attacks
    Zhang, Haili
    Li, Linlin
    Qiao, Liang
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
  • [6] Protecting nuclear plants from cyber-attacks
    Armstrong, Peter
    [J]. NUCLEAR ENGINEERING INTERNATIONAL, 2014, 59 (723): : 22 - 23
  • [7] Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks
    Pasandideh, Shabnam
    Gomes, Luis
    Malo, Pedro
    [J]. 2019 IEEE 28TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2019, : 1644 - 1649
  • [8] Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns
    Stergiopoulos, George
    Gritzalis, Dimitris A.
    Limnaios, Evangelos
    [J]. IEEE ACCESS, 2020, 8 : 128440 - 128475
  • [9] Attack-Tolerant Network Control System Based on the Deception for the Cyber-Attacks
    Yaseen, Amer Atta
    Bayart, Mireille
    [J]. 2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2015, : 37 - 44
  • [10] Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
    Stan, Orly
    Bitton, Ron
    Ezrets, Michal
    Dadon, Moran
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Yagyu, Tomohiko
    Elovici, Yuval
    Shabtai, Asaf
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1936 - 1954