Malcoda: Practical and Stochastic Security Risk Assessment for Enterprise Networks

被引:0
|
作者
Sato, Ryohei [1 ]
Kawaguchi, Hidetoshi [1 ]
Nakatani, Yuichi [1 ]
机构
[1] NTT Network Innovat Ctr, Tokyo 1808585, Japan
关键词
Security; Computational modeling; Risk management; Analytical models; Probability; Explosions; Security risk assessment; security risk management; network security; SELECTION;
D O I
10.1109/TDSC.2024.3434748
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many security risk assessment models have been proposed to describe and analyze security risks and their dependencies in network systems by means of graphs. However, these models suffer from two significant problems. First, they require a lot of human intervention and expertise in the graph generation process because they assume that experts are responsible for collecting and organizing large amounts of input data necessary for the assessment. Second, they are difficult to apply to large-scale networks since the graph size and the computational cost grow explosively with the network size. To tackle these problems, we propose a novel methodology named malicious communication dependency analysis (Malcoda) for assessing security risks of enterprise networks. Malcoda identifies risks in a network on the basis of input data automatically obtained from existing security products and describes probabilistic dependencies among information assets, threats, and vulnerabilities through a Bayesian network (BN)-based model dubbed the Malco directed acyclic graph (DAG). It then analyzes the Malco DAG to calculate the probability that each asset and vulnerability is exposed to threats (risk probability). Malcoda minimizes human intervention and enables administrators with limited expertise to easily assess security risks by automatically collecting and organizing the input data required for constructing the graphs. The Malco DAG, which is lighter than existing models, significantly reduces the computational cost and improves the scalability. The evaluation of Malcoda implemented in a virtual enterprise network demonstrates that Malcoda can automatically and quickly complete the assessment process and output reasonable risk probabilities reflecting threats, i.e., intrusion detection system (IDS) alerts. The computational complexity of Malcoda is also found to be less than or equal to that of existing models.
引用
收藏
页码:1383 / 1399
页数:17
相关论文
共 50 条
  • [21] Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Yawen
    Xue, Weixian
    Zhang, Anqi
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (03)
  • [22] Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
    Wang, Hao
    Li, Junhao
    Liu, Dong
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 72 - 76
  • [23] Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network
    Munir, Rashid
    Mufti, Muhammad Rafiq
    Awan, Irfan
    Hu, Yim Fun
    Disso, Jules Pagna
    2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 256 - 263
  • [24] AN APPROACH FOR DESIGNING OF ENTERPRISE IT LANDSCAPES TO PERFORM QUANTITAVE INFORMATION SECURITY RISK ASSESSMENT
    Romanov, Anton
    Okamoto, Eiji
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 313 - 318
  • [25] Quantitative assessment of enterprise security system
    Breu, Ruth
    Innerhofer-Oberperfler, Frank
    Yautsiukhin, Artsiom
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 921 - +
  • [26] Risk Based Static Security Assessment in a Practical Interconnected Power System
    Marsadek, M.
    Mohamed, A.
    Nizam, M.
    Norpiah, Z. M.
    2008 IEEE 2ND INTERNATIONAL POWER AND ENERGY CONFERENCE: PECON, VOLS 1-3, 2008, : 1613 - 1616
  • [27] Modeling of security and risk of bankruptcy of enterprise
    Munjishvili, Tea
    Kharabadze, Elena
    SCIENTIFIC JOURNALS OF THE MARITIME UNIVERSITY OF SZCZECIN-ZESZYTY NAUKOWE AKADEMII MORSKIEJ W SZCZECINIE, 2013, 35 (107): : 103 - 108
  • [28] NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks
    Ghosh, Nirnay
    Chokshi, Ishan
    Sarkar, Mithun
    Ghosh, Soumya K.
    Kaushik, Anil Kumar
    Das, Sajal K.
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2015,
  • [29] Virtual enterprise risk and security management
    Feglar, T
    ISC'2005: 3rd Industrial Simulation Conference 2005, 2005, : 145 - 149
  • [30] Information Security Risk Assessment and Management Method in Computer Networks
    Anikin, Igor V.
    2015 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2015,