Minimum-cost network hardening using attack graphs

被引:174
|
作者
Wang, Lingyu [1 ]
Noel, Steven [1 ]
Jajodia, Sushil [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
intrusion detection; vulnerability analysis; intrusion prevention;
D O I
10.1016/j.comcom.2006.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given critical resources. However, attack graphs do not directly provide a solution to remove the threat. Finding a solution by hand is error-prone and tedious, particularly for larger and less secure networks whose attack graphs are overly complicated. In this paper, we propose a solution to automate the task of hardening a network against multi-step intrusions. Unlike existing approaches whose solutions require removing exploits, our solution is comprised of initially satisfied conditions only. Our solution is thus more enforceable, because the initial conditions can be independently disabled, whereas exploits are usually consequences of other exploits and hence cannot be disabled without removing the causes. More specifically, we first represent given critical resources as a logic proposition of initial conditions. We then simplify the proposition to make hardening options explicit. Among the options we finally choose solutions with the minimum cost. The key improvements over the preliminary version of this paper include a formal framework of the minimum network hardening problem, and an improved one-pass algorithm in deriving the logic proposition while avoiding logic loops. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:3812 / 3824
页数:13
相关论文
共 50 条
  • [21] A Memetic Algorithm for Minimum-Cost Vertex-Biconnectivity Augmentation of Graphs
    Ivana Ljubić
    Günther R. Raidl
    [J]. Journal of Heuristics, 2003, 9 : 401 - 427
  • [22] Minimum-Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network
    Zheng, S. Q.
    Wang, Jianping
    Yang, Bing
    Yang, Mei
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (05) : 1436 - 1449
  • [23] A Faster Algorithm for Minimum-cost Bipartite Perfect Matching in Planar Graphs
    Asathulla, Mudabir Kabir
    Khanna, Sanjeev
    Lahn, Nathaniel
    Raghvendra, Sharath
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2020, 16 (01)
  • [24] A least-squares minimum-cost network flow algorithm
    Gopalakrishnan, Balaji
    Kong, Seunghyun
    Barnes, Earl
    Johnson, Ellis L.
    Sokol, Joel S.
    [J]. ANNALS OF OPERATIONS RESEARCH, 2011, 186 (01) : 119 - 140
  • [25] Multi-Rate Network Coding for Minimum-Cost Multicasting
    Goseling, Jasper
    Weber, Jos H.
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 36 - 40
  • [26] MINIMUM-COST THRESHOLDING STRATEGY
    BATCHELOR, DB
    SAMPSON, CE
    [J]. PROCEEDINGS OF THE IEEE, 1973, 61 (04) : 510 - 512
  • [27] A method for designing minimum-cost multisource multisink network layouts
    Heijnen, Petra W.
    Chappin, Emile J. L.
    Herder, Paulien M.
    [J]. SYSTEMS ENGINEERING, 2020, 23 (01) : 14 - 35
  • [28] A least-squares minimum-cost network flow algorithm
    Balaji Gopalakrishnan
    Seunghyun Kong
    Earl Barnes
    Ellis L. Johnson
    Joel S. Sokol
    [J]. Annals of Operations Research, 2011, 186 : 119 - 140
  • [29] Minimum-cost portfolio insurance
    Aliprantis, CD
    Brown, DJ
    Werner, J
    [J]. JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2000, 24 (11-12): : 1703 - 1719
  • [30] A Novel Minimum Cost of Network Hardening Model
    Ma, Jun-Chun
    Chen, Shan
    Li, Min
    [J]. 2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 347 - 354