Optimal Security Hardening Using Multi-objective Optimization on Attack Tree Models of Networks

被引:0
|
作者
Dewri, Rinku [1 ]
Poolsappasit, Nayot [1 ]
Ray, Indrajit [1 ]
Whitley, Darrell [1 ]
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
关键词
Security management; Attack trees; Multi-objective optimization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also addressed the problem of minimizing the total cost of implementing these hardening measures, given costs for individual measures. However, system administrators are often faced with a more challenging problem since they have to work within a fixed budget which may be less than the minimum cost of system hardening. Their problem is how to select a subset of security hardening measures so as to be within the budget and yet minimize the residual damage to the system caused by not plugging all required security holes. In this work, we develop a systematic approach to solve this problem by formulating it as multi-objective optimization problem on an attack tree model of the system and then use an evolutionary algorithm to solve it.
引用
收藏
页码:204 / 213
页数:10
相关论文
共 50 条
  • [1] An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm
    Enoch, Simon Yusuf
    Mendonca, Julio
    Hong, Jin B.
    Ge, Mengmeng
    Kim, Dong Seong
    COMPUTER NETWORKS, 2022, 208
  • [2] Optimal security hardening on attack tree models of networks: a cost-benefit analysis
    Rinku Dewri
    Indrajit Ray
    Nayot Poolsappasit
    Darrell Whitley
    International Journal of Information Security, 2012, 11 : 167 - 188
  • [3] Optimal security hardening on attack tree models of networks: a cost-benefit analysis
    Dewri, Rinku
    Ray, Indrajit
    Poolsappasit, Nayot
    Whitley, Darrell
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (03) : 167 - 188
  • [4] Multi-Objective Security Hardening Optimisation for Dynamic Networks
    Enoch, Simon Yusuf
    Hong, Jin B.
    Ge, Mengmeng
    Khan, Khaled M.
    Kim, Dong Seong
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [5] A Multi-Objective Approach for Security Hardening and Probabilistic Vulnerability Assessment on Attack Graphs
    Bardhan, Shuvo
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 726 - 735
  • [6] Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks
    Ali, Hamid
    Khan, Farrukh Aslam
    APPLIED SOFT COMPUTING, 2013, 13 (09) : 3903 - 3921
  • [7] Multi-objective optimization using statistical models
    Tsionas, Mike G.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2019, 276 (01) : 364 - 378
  • [8] Multi-objective optimization of iron ore induration process using optimal neural networks
    Miriyala, Srinivas Soumitri
    Mitra, Kishalay
    MATERIALS AND MANUFACTURING PROCESSES, 2020, 35 (05) : 537 - 544
  • [9] Dividing Rectangles Attack Multi-Objective Optimization
    Al-Dujaili, Abdullah
    Suresh, S.
    2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 3606 - 3613
  • [10] Multi-objective optimization for Security and QoS adaptation in Wireless Sensor Networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,