Minimum-cost network hardening using attack graphs

被引:174
|
作者
Wang, Lingyu [1 ]
Noel, Steven [1 ]
Jajodia, Sushil [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
intrusion detection; vulnerability analysis; intrusion prevention;
D O I
10.1016/j.comcom.2006.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given critical resources. However, attack graphs do not directly provide a solution to remove the threat. Finding a solution by hand is error-prone and tedious, particularly for larger and less secure networks whose attack graphs are overly complicated. In this paper, we propose a solution to automate the task of hardening a network against multi-step intrusions. Unlike existing approaches whose solutions require removing exploits, our solution is comprised of initially satisfied conditions only. Our solution is thus more enforceable, because the initial conditions can be independently disabled, whereas exploits are usually consequences of other exploits and hence cannot be disabled without removing the causes. More specifically, we first represent given critical resources as a logic proposition of initial conditions. We then simplify the proposition to make hardening options explicit. Among the options we finally choose solutions with the minimum cost. The key improvements over the preliminary version of this paper include a formal framework of the minimum network hardening problem, and an improved one-pass algorithm in deriving the logic proposition while avoiding logic loops. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:3812 / 3824
页数:13
相关论文
共 50 条
  • [41] EFFICIENCY OF THE PRIMAL NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM-COST CIRCULATION PROBLEM
    TARJAN, RE
    [J]. MATHEMATICS OF OPERATIONS RESEARCH, 1991, 16 (02) : 272 - 291
  • [42] A LAGRANGEAN HEURISTIC FOR THE CAPACITATED CONCAVE MINIMUM-COST NETWORK FLOW PROBLEM
    LARSSON, T
    MIGDALAS, A
    RONNQVIST, M
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 1994, 78 (01) : 116 - 129
  • [43] Achieving minimum-cost multicast:: A decentralized approach based on network coding
    Lun, DS
    Ratnakar, N
    Koetter, R
    Médard, M
    Ahmed, E
    Lee, H
    [J]. IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1608 - 1617
  • [44] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
    Durkota, Karel
    Lisy, Viliam
    Kiekintveld, Christopher
    Bosansky, Branislav
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 1773 - 1774
  • [45] A minimum-cost strategy for cluster recruitment
    Chan, WY
    Peng, NF
    [J]. BIOMETRICAL JOURNAL, 2000, 42 (07) : 877 - 886
  • [46] EFFICIENT MINIMUM-COST MATCHING AND TRANSPORTATION USING THE QUADRANGLE INEQUALITY
    AGGARWAL, A
    BARNOY, A
    KHULLER, S
    KRAVETS, D
    SCHIEBER, B
    [J]. JOURNAL OF ALGORITHMS, 1995, 19 (01) : 116 - 143
  • [47] MINIMUM-COST DESIGN OF REINFORCED SHELLS
    KLESHCHE.SI
    [J]. RUSSIAN ENGINEERING JOURNAL-USSR, 1970, 50 (05): : 17 - &
  • [48] MINIMUM-COST DESIGN OF HORIZONTAL PIPELINES
    HATHOOT, HM
    [J]. JOURNAL OF TRANSPORTATION ENGINEERING-ASCE, 1984, 110 (03): : 382 - 389
  • [49] MINIMUM-COST MULTIFLOWS IN UNDIRECTED NETWORKS
    KARZANOV, AV
    [J]. MATHEMATICAL PROGRAMMING, 1994, 66 (03) : 313 - 325
  • [50] Minimum-cost paths for electric cars
    Dorfman, Dani
    Kaplan, Haim
    Tarjan, Robert E.
    Thorup, Mikkel
    Zwick, Uri
    [J]. 2024 SYMPOSIUM ON SIMPLICITY IN ALGORITHMS, SOSA, 2024, : 374 - 382