Network risk management using attacker profiling

被引:29
作者
Dantu, Ram [1 ]
Kolan, Prakash [2 ]
Cangussu, Joao [3 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ N Texas, Dept Comp Sci, Denton, TX 76203 USA
[3] Univ Texas Dallas, Dept Comp Sci, Dallas, TX 75230 USA
关键词
attack graphs; behavior; risk management;
D O I
10.1002/sec.58
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Risk management refers to the process of making decisions that minimize the effects of vulnerabilities on the network hosts. This can be a difficult task in the context of high-exploit probability and the difficult to identify new exploits and vulnerabilities. For many years, security engineers have performed risk analysis using economic models for the design and operation of risk-prone, technological systems using attack profiles. Based on the type of attacker identified, security administrators can formulate effective risk management policies for a network. We hypothesize that sequence of network actions by an attacker depends on the social behavior (e.g., skill level, tenacity, financial ability). We extended this and formulated a mechanism to estimate the risk level of critical resources that may be compromised based on attacker behavior. This estimation is accomplished using behavior based attack graphs representing all the possible attack paths to all the critical resources. The risk level is computed based on these graphs and are used as a measure of the vulnerability of the resource and forming an effective basis for a system administrator to perform suitable changes to network configuration. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:83 / 96
页数:14
相关论文
共 25 条
[1]   Sensitivity analysis in discrete Bayesian networks [J].
Castillo, E ;
Gutierrez, JM ;
Hadi, AS .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 1997, 27 (04) :412-423
[2]   The changing definition and image of hackers in popular discourse [J].
Chandler, A .
INTERNATIONAL JOURNAL OF THE SOCIOLOGY OF LAW, 1996, 24 (02) :229-251
[3]  
DANTU R, 2005, LECT NOTES COMPUTER
[4]  
DANTU R, 2006, SURVEY BEHAV PROFILE
[5]  
DANTU R, 2003, 19 ANN COMP IN PRESS
[6]  
DANTU R, 2004, IEEE INT C INF TECHN
[7]  
DESMOND J, 2003, CHECKMATE IDS TRIES
[8]  
JACKSON G, 2003, PSYNAPSE TECHNO 0101
[9]  
JASANOFF S, 1998, SOCIOL REV, V46, P757
[10]  
KLEEN L, 2001, THESIS AIR FORCE I T