A decision model based security risk management approach

被引:0
|
作者
Bhattacharya, Somak [1 ]
Ghosh, S. K. [2 ,3 ]
机构
[1] Indian Inst Technol, Informat Technol, Kharagpur, W Bengal, India
[2] Indian Inst Technol, Sch Informat Technol, Kharagpur, W Bengal, India
[3] Govt India, ISRO, Dept Space, Bangalore, Karnataka, India
关键词
attack graph; exploit; risk management; vulnerability; attack path;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With increasing availability of computing system the enterprises are becoming increasing dependent on IT infrastructure and thus becoming vulnerable to threats. To assess the security of enterprise network, one must first understand how vulnerabilities can be combined for an attack Such an understanding becomes possible with recent advances in modeling the composition of vulnerabilities as attack graphs. An attack graph is a general formalism used to model security vulnerabilities of a system and all possible sequences of exploits which an intruder can use to achieve a specific goal. However, as the size and computational complexity of attack graphs greatly exceeds human ability to visualize, understand and analyze, a model is required to identify high probable paths of attack graphs that a potential attacker may follow. One method for handling attack graph complexity and scalability is to differentiate between likely and unlikely attack paths using threat modeling. Threat modeling is used during risk assessment to describe likely and unlikely adversary behavior, and so can be used for the same purpose during attack graph analysis and attack path identification out of it. The proposed approach uses a decision theoretic model to identify the most probable attack path using threat modeling.
引用
下载
收藏
页码:1194 / 1199
页数:6
相关论文
共 50 条
  • [41] A MODEL CHECKER BASED APPROACH OF ATTACK PATH ENUMERATION FOR NETWORK SECURITY MANAGEMENT
    Bagchi, Atig
    Ghosh, S. K.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1809 - 1816
  • [42] Reliability analysis of risk model metrics based on business approach in information security
    Ibnugraha P.D.
    Nugroho L.E.
    Santosa P.I.
    Ingenierie des Systemes d'Information, 2020, 25 (04): : 475 - 480
  • [43] An economic modelling approach to information security risk management
    Bojanc, Rok
    Jerman-Blazic, Borka
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) : 413 - 422
  • [44] A game theoretic approach to cyber security risk management
    Musman, Scott
    Turner, Andrew
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 127 - 145
  • [45] IoT Security Risk Management: A Framework and Teaching Approach
    Affia, Abasi-amefon O.
    Nolte, Alexander
    Matulevicius, Raimundas
    INFORMATICS IN EDUCATION, 2023, 22 (04): : 555 - 588
  • [46] Agile Approach with Kanban in Information Security Risk Management
    Dorca, Vasile
    Popescu, Sorin
    Munteanu, Radu, Jr.
    Chioreanu, Adrian
    Peleskei, Claudius
    PROCEEDING OF 2016 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2016, : 19 - 24
  • [47] Towards a Systemic Approach for Information Security Risk Management
    Naudet, Yannick
    Mayer, Nicolas
    Feltus, Christophe
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 177 - 186
  • [48] A quantitative decision support model for security and business continuity management
    von Roessing, R
    SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 3 - 20
  • [49] RISK AND BUSINESS DECISION - MANAGEMENT AND MARKOWITZ MODEL
    MCFARLANE, DD
    HOROWITZ, I
    BUSINESS HORIZONS, 1967, 10 (02) : 81 - 90
  • [50] Decision Model for the Security and Utility Risk Evaluation (SURE) Framework
    Billard, Angela K.
    PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2019), 2019,