Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs

被引:6
|
作者
Widel, Wojciech [1 ]
Mukherjee, Preetam [1 ]
Ekstedt, Mathias [1 ]
机构
[1] KTH Royal Inst Technol, Div Network & Syst Engn, S-10044 Stockholm, Sweden
基金
欧盟地平线“2020”;
关键词
Security; DSL; Costs; Analytical models; Optimization; Computational modeling; Stochastic processes; Risk assessment; Threat modeling; Attack graphs; attack simulations; countermeasure selection; graphical security modeling; threat modeling;
D O I
10.1109/ACCESS.2022.3200601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Connecting critical infrastructure assets to the network is absolutely essential for modern industries. In contrast to the apparent advantages, network connectivity exposes other infrastructure vulnerabilities that can be exploited by attackers. To protect the infrastructure, precise countermeasure identification is necessary. In this regard, the objective for the security officers is to identify the optimal set of countermeasures under a variety of budgetary restrictions. Our approach is based on the Meta Attack Language framework, which allows for convenient modelling of said infrastructures, as well as for automatic generation of attack graphs describing attacks against them. We formalize the problem of the selection of countermeasures in this context. The formalization makes it possible to deal with an arbitrary number of budgets, expressing available resources of both monetary and time-like nature, and to model numerous dependencies between countermeasures, including order dependencies, mutual exclusivity, and interdependent implementation costs. We propose a flexible and scalable algorithm for the problem. The whole methodology is validated in practice on realistic models.
引用
收藏
页码:89645 / 89662
页数:18
相关论文
共 50 条
  • [21] Applying Attack Graphs to Network Security Metric
    Xie, Anming
    Wen, Weiping
    Zhang, Li
    Hu, Jianbin
    Chen, Zhong
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
  • [22] A Method for Analyzing EPC Entity Security Threats by Using Attack Graphs
    Chen, Zhinan
    Peng, Jianhua
    Peng, Caixia
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 981 - 984
  • [23] An Automated Framework for Generating Attack Graphs Using Known Security Threats
    Alnafrani, Rami
    Wijesekera, Duminda
    2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
  • [24] Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs
    Li, Lening
    Ma, Haoxiang
    Han, Shuo
    Fu, Jie
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 3415 - 3421
  • [25] Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
    Gylling, Andreas
    Ekstedt, Mathias
    Afzal, Zeeshan
    Eliasson, Per
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 304 - 311
  • [26] Identification of Attack Paths Using Kill Chain and Attack Graphs
    Sadlek, Lukas
    Celeda, Pavel
    Tovarnak, Daniel
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [27] Poster: CrystalBall - Attack Graphs Using Large Language Models and RAGs
    Prapty, Renascence Tarafder
    Kundu, Ashish
    Iyengar, Arun
    2024 IEEE 44TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS 2024, 2024, : 1450 - 1451
  • [28] Optimal Security Hardening over a Probabilistic Attack Graph
    Buczkowski, Przemyslaw
    Malacaria, Pasquale
    Hankin, Chris
    Fielder, Andrew
    SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 21 - 30
  • [29] An attack graph-based probabilistic security metric
    Wang, Lingyu
    Islam, Tania
    Long, Tao
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
  • [30] GENERATING NETWORK ATTACK GRAPHS FOR SECURITY ALERT CORRELATION
    Zhang, Shaojun
    Li, Jianhua
    Chen, Xiuzhen
    Fan, Lei
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 220 - 225