Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis

被引:0
|
作者
Bansal, Urvashi [1 ]
Sikka, Geeta [2 ]
Awasthi, Lalit K. [3 ]
Bhargava, Bharat [4 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Jalandhar 144027, Punjab, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Delhi 110036, India
[3] Natl Inst Technol, Srinagar 246174, Uttarakhand, India
[4] Purdue Univ, W Lafayette, IN 47907 USA
关键词
Security; Organizations; Complexity theory; Internet of Things; Cost function; Prototypes; Standards organizations; Attack graph analysis; attack path cost; CVSS; IoT vulnerability analysis; network security; vulnerability risk assessment for IoT; ATTACK GRAPH; AUTHENTICATION PROTOCOL; SECURITY; IOT; FRAMEWORK; NETWORKS; PRIVACY;
D O I
10.1109/TDSC.2023.3253121
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The significant expansion in network size to support new paradigms such as cloud computing, IoT (Internet of Things), etc. together with the exponential increase in vulnerabilities has challenged the existing security mechanisms greatly. These challenges have opened many avenues for research in network security. However, while attack graphs play an important role in analyzing vulnerabilities, analyzing large attack graphs itself is a major issue. Therefore, it is necessary to extract only the critical part of the attack graph. Although technologies have been developed for attack path characterization, there is a lack of hybrid technology that can differentiate between similar behavior attack paths. We have proposed a cost-based path characterization technique that takes the attack node's vulnerability complexity into account and significantly reduces the number of vulnerabilities that need to be patched to avoid the major segment of attack graph. Moreover, we have used a real network prototype to validate the performance of the proposed scheme. The proposed scheme works well in cases where some vulnerabilities have similar risk scores. To the best of our knowledge, this is the first time that a cost-effective approach for attack path analysis has been proposed.
引用
收藏
页码:298 / 308
页数:11
相关论文
共 50 条
  • [1] Vulnerability Analysis for a Quantitative Security Evaluation
    Vache, Geraldine
    ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 527 - 535
  • [2] Cost-benefit analysis of the aerocapture mission set
    Hall, JL
    Noca, MA
    Bailey, RW
    JOURNAL OF SPACECRAFT AND ROCKETS, 2005, 42 (02) : 309 - 320
  • [3] Software architecture evaluation methods based on cost benefit analysis and quantitative decision making
    Lee, Jihyun
    Kang, Sungwon
    Kim, Chang-Ki
    EMPIRICAL SOFTWARE ENGINEERING, 2009, 14 (04) : 453 - 475
  • [4] Software architecture evaluation methods based on cost benefit analysis and quantitative decision making
    Jihyun Lee
    Sungwon Kang
    Chang-Ki Kim
    Empirical Software Engineering, 2009, 14 : 453 - 475
  • [5] Transport infrastructure project evaluation using cost-benefit analysis
    Jones, Heather
    Moura, Filipe
    Domingos, Tiago
    TRANSPORTATION: CAN WE DO MORE WITH LESS RESOURCES? - 16TH MEETING OF THE EURO WORKING GROUP ON TRANSPORTATION - PORTO 2013, 2014, 111 : 400 - 409
  • [6] Social vulnerability in cost-benefit analysis for flood risk management
    Kind, Jarl
    Botzen, W. J. Wouter
    Aerts, Jeroen C. J. H.
    ENVIRONMENT AND DEVELOPMENT ECONOMICS, 2020, 25 (02) : 115 - 134
  • [7] COST-BENEFIT-ANALYSIS IN PLAN EVALUATION
    LICHFIELD, N
    TOWN PLANNING REVIEW, 1964, 35 (02): : 159 - 169
  • [8] EVALUATION OF COST-BENEFIT ANALYSIS CRITERIA
    NASH, C
    PEARCE, D
    STANLEY, J
    SCOTTISH JOURNAL OF POLITICAL ECONOMY, 1975, 22 (02) : 121 - 134
  • [9] COST-BENEFIT ANALYSIS + PROJECT EVALUATION
    MACDONALD, JS
    OPERATIONS RESEARCH, 1964, 12 : B75 - &
  • [10] Comprehensive Benefit Evaluation of Biobanks based on Cost-benefit Analysis
    Ang Li
    Innovation and Development Policy, 2024, 6 (01) : 75 - 95