Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements

被引:9
|
作者
Hadar, Ethan [1 ]
Hassanzadeh, Amin [1 ]
机构
[1] Accenture, Cyber Fus Ctr, Accenture Labs, Dublin, Ireland
关键词
Security Requirements; Requirements Prioritization; Agile Security; Attack Graph; Graph Analytics; Attack Path; Remediation Requirements; Attack Surface; Cyber Digital Twin; CONTROL-SYSTEMS;
D O I
10.1109/RE.2019.00042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In enterprise environments, the amount of managed assets and vulnerabilities that can be exploited is staggering. Hackers' lateral movements between such assets generate a complex big data graph, that contains potential hacking paths. In this vision paper, we enumerate risk-reduction security requirements in large scale environments, then present the Agile Security methodology and technologies for detection, modeling, and constant prioritization of security requirements, agile style. Agile Security models different types of security requirements into the context of an attack graph, containing business process targets and critical assets identification, configuration items, and possible impacts of cyber-attacks. By simulating and analyzing virtual adversary attack paths toward cardinal assets, Agile Security examines the business impact on business processes and prioritizes surgical requirements. Thus, handling these requirements backlog that are constantly evaluated as an outcome of employing Agile Security, gradually increases system hardening, reduces business risks and informs the IT service desk or Security Operation Center what remediation action to perform next. Once remediated, Agile Security constantly recomputes residual risk, assessing risk increase by threat intelligence or infrastructure changes versus defender's remediation actions in order to drive overall attack surface reduction.
引用
收藏
页码:330 / 339
页数:10
相关论文
共 50 条
  • [1] Big Data Analytics for Cyber Security
    Angin, Pelin
    Bhargava, Bharat
    Ranchal, Rohit
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [2] Agile Visual Analytics for Banking Cyber "Big Data"
    Jonker, David
    Langevin, Scott
    Schretlen, Peter
    Canfield, Casey
    [J]. 2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 299 - 300
  • [3] Redefining Cyber Security with Big Data Analytics
    Apurva, Aviral
    Ranakoti, Pranshu
    Yadav, Saurav
    Tomer, Shashank
    Roy, Nihar Ranjan
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 199 - 203
  • [4] On the scalability of Big Data Cyber Security Analytics systems
    Ullah, Faheem
    Babar, M. Ali
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 198
  • [5] Big Data Analytics Technique in Cyber Security: A Review
    Srivastava, Neha
    Jaiswal, Umesh Chandra
    [J]. PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 579 - 585
  • [6] Agile Big Data Analytics
    Grady, Nancy W.
    Payne, Jason A.
    Parker, Huntley
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 2331 - 2339
  • [7] Neural Network Models in Big Data Analytics and Cyber Security
    Ghimes, Ana-Maria
    Patriciu, Victor-Valeriu
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [8] QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics
    Ullaha, Faheem
    Babar, M. Ali
    [J]. 2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 81 - 86
  • [9] Big Data Analytics in Cyber Security: Network Traffic and Attacks
    Wang, Lidong
    Jones, Randy
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (05) : 410 - 417
  • [10] Design and evaluation of adaptive system for big data cyber security analytics
    Ullah, Faheem
    Babar, M. Ali
    Aleti, Aldeida
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 207