Dynamic Security Risk Management Using Bayesian Attack Graphs

被引:455
作者
Poolsappasit, Nayot [1 ]
Dewri, Rinku [2 ]
Ray, Indrajit [3 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
[2] Univ Denver, Dept Comp Sci, Denver, CO 80208 USA
[3] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
基金
美国国家科学基金会;
关键词
Security risk assessment; mitigation analysis; Bayesian belief networks; attack graph;
D O I
10.1109/TDSC.2011.34
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security risk assessment and mitigation are two vital processes that need to be executed to maintain a productive IT infrastructure. On one hand, models such as attack graphs and attack trees have been proposed to assess the cause-consequence relationships between various network states, while on the other hand, different decision problems have been explored to identify the minimum-cost hardening measures. However, these risk models do not help reason about the causal dependencies between network states. Further, the optimization formulations ignore the issue of resource availability while analyzing a risk model. In this paper, we propose a risk management framework using Bayesian networks that enable a system administrator to quantify the chances of network compromise at various levels. We show how to use this information to develop a security mitigation and management plan. In contrast to other similar models, this risk model lends itself to dynamic analysis during the deployed phase of the network. A multiobjective optimization platform provides the administrator with all trade-off information required to make decisions in a resource constrained environment.
引用
收藏
页码:61 / 74
页数:14
相关论文
共 37 条
[11]  
Dantu Ram, 2007, 2007 IEEE Intelligence and Security Informatics, P71, DOI 10.1109/ISI.2007.379536
[12]   Network risk management using attacker profiling [J].
Dantu, Ram ;
Kolan, Prakash ;
Cangussu, Joao .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) :83-96
[13]  
Dawkins J., 2002, P WORKSH STAT MACH T
[14]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[15]  
Dewri R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P204
[16]  
Frigault Marcel, 2008, 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC), P698, DOI 10.1109/COMPSAC.2008.88
[17]  
Frigault M., 2008, P 14 ACM WORKSH QUAL
[18]  
Goldberg DE., 1989, GENETIC ALGORITHMS S, V13
[19]   SAT-Solving Approaches to Context-Aware Enterprise Network Security Management [J].
Homer, John ;
Ou, Xinming .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (03) :315-322
[20]   Two formal analyses of attack graphs [J].
Jha, S ;
Sheyner, O ;
Wing, J .
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, :49-63