Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs

被引:6
|
作者
Widel, Wojciech [1 ]
Mukherjee, Preetam [1 ]
Ekstedt, Mathias [1 ]
机构
[1] KTH Royal Inst Technol, Div Network & Syst Engn, S-10044 Stockholm, Sweden
基金
欧盟地平线“2020”;
关键词
Security; DSL; Costs; Analytical models; Optimization; Computational modeling; Stochastic processes; Risk assessment; Threat modeling; Attack graphs; attack simulations; countermeasure selection; graphical security modeling; threat modeling;
D O I
10.1109/ACCESS.2022.3200601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Connecting critical infrastructure assets to the network is absolutely essential for modern industries. In contrast to the apparent advantages, network connectivity exposes other infrastructure vulnerabilities that can be exploited by attackers. To protect the infrastructure, precise countermeasure identification is necessary. In this regard, the objective for the security officers is to identify the optimal set of countermeasures under a variety of budgetary restrictions. Our approach is based on the Meta Attack Language framework, which allows for convenient modelling of said infrastructures, as well as for automatic generation of attack graphs describing attacks against them. We formalize the problem of the selection of countermeasures in this context. The formalization makes it possible to deal with an arbitrary number of budgets, expressing available resources of both monetary and time-like nature, and to model numerous dependencies between countermeasures, including order dependencies, mutual exclusivity, and interdependent implementation costs. We propose a flexible and scalable algorithm for the problem. The whole methodology is validated in practice on realistic models.
引用
收藏
页码:89645 / 89662
页数:18
相关论文
共 50 条
  • [1] Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs
    Johnson, Pontus
    Vernotte, Alexandre
    Gorton, Dan
    Ekstedt, Mathias
    Lagerstrom, Robert
    RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 37 - 52
  • [2] Enhancement of Probabilistic Attack Graphs for Accurate Cyber Security Monitoring
    Doynikova, Elena
    Kotenko, Igor
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [3] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
    GAO Ni
    HE Yiyue
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (02) : 171 - 177
  • [4] Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
    Ingols, Kyle
    Chu, Matthew
    Lippmann, Richard
    Webster, Seth
    Boyer, Stephen
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 117 - 126
  • [5] Evaluation of SOA security metrics using attack graphs
    Magott, Jan
    Woda, Marek
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 277 - 284
  • [6] Measuring Security Risk of Networks Using Attack Graphs
    Noel, Steven
    Jajodia, Sushil
    Wang, Lingyu
    Singhal, Anoop
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2010, 1 (01): : 113 - 123
  • [7] Toward Measuring Network Security Using Attack Graphs
    Wang, Lingyu
    Singhal, Anoop
    Jajodia, Sushil
    QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 49 - 54
  • [8] Exploring security countermeasures along the attack sequence
    Sakuraba, Taketoshi
    Domyo, Seiichi
    Chou, Bin-Hui
    Sakurai, Kuichi
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 427 - 432
  • [9] Patching Security Vulnerabilities Using Stackelberg Security Games on Attack Graphs
    Wachter, Jasmin
    FRONTIERS OF ARTIFICIAL INTELLIGENCE, ETHICS, AND MULTIDISCIPLINARY APPLICATIONS, FAIEMA 2023, 2024, : 83 - 98
  • [10] Heuristic Approach for Countermeasure Selection Using Attack Graphs
    Stan, Orly
    Bitton, Ron
    Ezrets, Michal
    Dadon, Moran
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Yagyu, Tomohiko
    Elovici, Yuval
    Shabtai, Asaf
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 634 - 649