Minimum-cost network hardening using attack graphs

被引:174
|
作者
Wang, Lingyu [1 ]
Noel, Steven [1 ]
Jajodia, Sushil [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
intrusion detection; vulnerability analysis; intrusion prevention;
D O I
10.1016/j.comcom.2006.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given critical resources. However, attack graphs do not directly provide a solution to remove the threat. Finding a solution by hand is error-prone and tedious, particularly for larger and less secure networks whose attack graphs are overly complicated. In this paper, we propose a solution to automate the task of hardening a network against multi-step intrusions. Unlike existing approaches whose solutions require removing exploits, our solution is comprised of initially satisfied conditions only. Our solution is thus more enforceable, because the initial conditions can be independently disabled, whereas exploits are usually consequences of other exploits and hence cannot be disabled without removing the causes. More specifically, we first represent given critical resources as a logic proposition of initial conditions. We then simplify the proposition to make hardening options explicit. Among the options we finally choose solutions with the minimum cost. The key improvements over the preliminary version of this paper include a formal framework of the minimum network hardening problem, and an improved one-pass algorithm in deriving the logic proposition while avoiding logic loops. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:3812 / 3824
页数:13
相关论文
共 50 条
  • [1] An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs
    Chen, Feng
    Wang, Lingyu
    Su, Jinshu
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 209 - +
  • [2] Efficient minimum-cost network hardening via exploit dependency graphs
    Noel, S
    Jajodia, S
    O'Berry, B
    Jacobs, M
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 86 - 95
  • [3] A Minimum Cost of Network Hardening Model Based on Attack Graphs
    Ma Jun-chun
    Wang Yong-jun
    Sun Ji-yin
    Chen Shan
    [J]. CEIS 2011, 2011, 15
  • [4] The minimum-cost transformation of graphs
    Gorbunov, K. Yu.
    Lyubetsky, V. A.
    [J]. DOKLADY MATHEMATICS, 2017, 96 (02) : 503 - 505
  • [5] The minimum-cost transformation of graphs
    K. Yu. Gorbunov
    V. A. Lyubetsky
    [J]. Doklady Mathematics, 2017, 96 : 503 - 505
  • [6] MINIMUM-COST PATHS IN PERIODIC GRAPHS
    HOFTING, F
    WANKE, E
    [J]. SIAM JOURNAL ON COMPUTING, 1995, 24 (05) : 1051 - 1067
  • [7] Time-Efficient and Cost-Effective Network Hardening Using Attack Graphs
    Albanese, Massimiliano
    Jajodia, Sushil
    Noel, Steven
    [J]. 2012 42ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2012,
  • [8] Cost-Aware Network Hardening with Limited Budget using Compact Attack Graphs
    Yigit, Beytullah
    Gur, Gurkan
    Alagoz, Fatih
    [J]. 2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 152 - 157
  • [9] MINIMUM-COST MULTICOMMODITY NETWORK FLOWS
    TOMLIN, JA
    [J]. OPERATIONS RESEARCH, 1966, 14 (01) : 45 - &
  • [10] Holiest Minimum-Cost Paths and Flows in Surface Graphs
    Erickson, Jeff
    Fox, Kyle
    Lkhamsuren, Luvsandondov
    [J]. STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2018, : 1319 - 1332