Malcoda: Practical and Stochastic Security Risk Assessment for Enterprise Networks

被引:0
|
作者
Sato, Ryohei [1 ]
Kawaguchi, Hidetoshi [1 ]
Nakatani, Yuichi [1 ]
机构
[1] NTT Network Innovat Ctr, Tokyo 1808585, Japan
关键词
Security; Computational modeling; Risk management; Analytical models; Probability; Explosions; Security risk assessment; security risk management; network security; SELECTION;
D O I
10.1109/TDSC.2024.3434748
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many security risk assessment models have been proposed to describe and analyze security risks and their dependencies in network systems by means of graphs. However, these models suffer from two significant problems. First, they require a lot of human intervention and expertise in the graph generation process because they assume that experts are responsible for collecting and organizing large amounts of input data necessary for the assessment. Second, they are difficult to apply to large-scale networks since the graph size and the computational cost grow explosively with the network size. To tackle these problems, we propose a novel methodology named malicious communication dependency analysis (Malcoda) for assessing security risks of enterprise networks. Malcoda identifies risks in a network on the basis of input data automatically obtained from existing security products and describes probabilistic dependencies among information assets, threats, and vulnerabilities through a Bayesian network (BN)-based model dubbed the Malco directed acyclic graph (DAG). It then analyzes the Malco DAG to calculate the probability that each asset and vulnerability is exposed to threats (risk probability). Malcoda minimizes human intervention and enables administrators with limited expertise to easily assess security risks by automatically collecting and organizing the input data required for constructing the graphs. The Malco DAG, which is lighter than existing models, significantly reduces the computational cost and improves the scalability. The evaluation of Malcoda implemented in a virtual enterprise network demonstrates that Malcoda can automatically and quickly complete the assessment process and output reasonable risk probabilities reflecting threats, i.e., intrusion detection system (IDS) alerts. The computational complexity of Malcoda is also found to be less than or equal to that of existing models.
引用
收藏
页码:1383 / 1399
页数:17
相关论文
共 50 条
  • [31] Research on the application of neural networks to the security and risk assessment of information
    Lai, Kai
    Wang, Yan
    International Journal of Digital Content Technology and its Applications, 2012, 6 (09) : 132 - 140
  • [32] A Fuzzy AHP Approach for Security Risk Assessment in SCADA Networks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    Rakas, Slavica V. Bostjancic
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2019, 19 (03) : 69 - 74
  • [33] Information assurance security framework for enterprise networks
    Kesari, MD
    Velayutham, T
    Sudarsan, SD
    Jagadhane, M
    Sailaja, U
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 180 - 184
  • [34] Enhanced Data Security Architecture in Enterprise Networks
    Shree, V. Rashmi
    Antony, Zachariah C. F.
    Jayapandian, N.
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 857 - 864
  • [35] PSI: Precise Security Instrumentation for Enterprise Networks
    Yu, Tianlong
    Fayaz, Seyed K.
    Collins, Michael
    Sekar, Vyas
    Seshan, Srinivasan
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [36] Security Modelling and Analysis of Dynamic Enterprise Networks
    Yusuf, Simon Enoch
    Ge, Mengmeng
    Hong, Jin B.
    Kim, Huy Kang
    Kim, Paul
    Kim, Dong Seong
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 249 - 256
  • [37] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [38] Enterprise risk assessment of investment risk
    Kong, Feng
    Fu, Yuanyuan
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 572 - 574
  • [39] Financial Security Assessment in Enterprise Potential Management
    Gonchar, Olga
    Khachatrian, Valentyna
    Ostapchuk, Olha
    Bitiy, Andrii
    ESTUDIOS DE ECONOMIA APLICADA, 2020, 38 (04):
  • [40] Assessment of enterprise information security - The importance of prioritization
    Johansson, E
    Johnson, P
    Ninth IEEE International EDOC Enterprise Computing Conference, Proceedings, 2005, : 207 - 218