Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis

被引:0
|
作者
Bansal, Urvashi [1 ]
Sikka, Geeta [2 ]
Awasthi, Lalit K. [3 ]
Bhargava, Bharat [4 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Jalandhar 144027, Punjab, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Delhi 110036, India
[3] Natl Inst Technol, Srinagar 246174, Uttarakhand, India
[4] Purdue Univ, W Lafayette, IN 47907 USA
关键词
Security; Organizations; Complexity theory; Internet of Things; Cost function; Prototypes; Standards organizations; Attack graph analysis; attack path cost; CVSS; IoT vulnerability analysis; network security; vulnerability risk assessment for IoT; ATTACK GRAPH; AUTHENTICATION PROTOCOL; SECURITY; IOT; FRAMEWORK; NETWORKS; PRIVACY;
D O I
10.1109/TDSC.2023.3253121
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The significant expansion in network size to support new paradigms such as cloud computing, IoT (Internet of Things), etc. together with the exponential increase in vulnerabilities has challenged the existing security mechanisms greatly. These challenges have opened many avenues for research in network security. However, while attack graphs play an important role in analyzing vulnerabilities, analyzing large attack graphs itself is a major issue. Therefore, it is necessary to extract only the critical part of the attack graph. Although technologies have been developed for attack path characterization, there is a lack of hybrid technology that can differentiate between similar behavior attack paths. We have proposed a cost-based path characterization technique that takes the attack node's vulnerability complexity into account and significantly reduces the number of vulnerabilities that need to be patched to avoid the major segment of attack graph. Moreover, we have used a real network prototype to validate the performance of the proposed scheme. The proposed scheme works well in cases where some vulnerabilities have similar risk scores. To the best of our knowledge, this is the first time that a cost-effective approach for attack path analysis has been proposed.
引用
收藏
页码:298 / 308
页数:11
相关论文
共 50 条
  • [31] INTEGRATION OF COST-BENEFIT AND FINANCIAL ANALYSIS IN PROJECT EVALUATION
    HARLOW, KC
    WINDSOR, D
    PUBLIC ADMINISTRATION REVIEW, 1988, 48 (05) : 918 - 928
  • [32] COST-BENEFIT-ANALYSIS AND EVALUATION OF PSYCHIATRIC-SERVICES
    GLASS, NJ
    GOLDBERG, D
    PSYCHOLOGICAL MEDICINE, 1977, 7 (04) : 701 - 707
  • [33] Evaluation of decentralized hemodialysis in Norway: A cost-benefit analysis
    Bjorvatn, A
    DIALYSIS & TRANSPLANTATION, 2005, 34 (10) : 684 - +
  • [34] COST-BENEFIT ANALYSIS AND SOCIAL WELFARE PROGRAM EVALUATION
    LEVINE, AS
    SOCIAL SERVICE REVIEW, 1968, 42 (02) : 173 - 183
  • [35] PRESENT STATE OF COST-BENEFIT ANALYSIS IN MEDICAL EVALUATION
    STAHL, I
    ACTA MEDICA SCANDINAVICA, 1975, : 129 - 134
  • [36] The Appropriateness of Cost Benefit Analysis (CBA) to Public Project Evaluation
    Oyeyoade, Stephen Femi
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2012, : 292 - 296
  • [37] Cost-Benefit Analysis and Risk in Socioeconomic Evaluation of Projects
    Sieber, Patrik
    Hnilica, Jiri
    EKONOMICKY CASOPIS, 2011, 59 (07): : 669 - 683
  • [38] Cost-benefit Analysis of Using Heuristics in ACGP
    Aleshunas, John
    Janikow, Cezary
    2011 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2011, : 1172 - 1178
  • [39] Usability Cost Benefit Analysis Using a Mathematical Equation
    Rajper, Samina
    Shaikh, Abdul Wahid
    Shaikh, Zubair A.
    Amin, Imran
    EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 349 - +
  • [40] Using NCCI rating worksheet in cost/benefit analysis
    Vaidya, SC
    Weeks, AL
    APPLIED ERGONOMICS, 2001, : 244 - 250