Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs

被引:6
|
作者
Widel, Wojciech [1 ]
Mukherjee, Preetam [1 ]
Ekstedt, Mathias [1 ]
机构
[1] KTH Royal Inst Technol, Div Network & Syst Engn, S-10044 Stockholm, Sweden
基金
欧盟地平线“2020”;
关键词
Security; DSL; Costs; Analytical models; Optimization; Computational modeling; Stochastic processes; Risk assessment; Threat modeling; Attack graphs; attack simulations; countermeasure selection; graphical security modeling; threat modeling;
D O I
10.1109/ACCESS.2022.3200601
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Connecting critical infrastructure assets to the network is absolutely essential for modern industries. In contrast to the apparent advantages, network connectivity exposes other infrastructure vulnerabilities that can be exploited by attackers. To protect the infrastructure, precise countermeasure identification is necessary. In this regard, the objective for the security officers is to identify the optimal set of countermeasures under a variety of budgetary restrictions. Our approach is based on the Meta Attack Language framework, which allows for convenient modelling of said infrastructures, as well as for automatic generation of attack graphs describing attacks against them. We formalize the problem of the selection of countermeasures in this context. The formalization makes it possible to deal with an arbitrary number of budgets, expressing available resources of both monetary and time-like nature, and to model numerous dependencies between countermeasures, including order dependencies, mutual exclusivity, and interdependent implementation costs. We propose a flexible and scalable algorithm for the problem. The whole methodology is validated in practice on realistic models.
引用
收藏
页码:89645 / 89662
页数:18
相关论文
共 50 条
  • [31] Towards System-Level Security Analysis of IoT Using Attack Graphs
    Fang, Zheng
    Fu, Hao
    Gu, Tianbo
    Hu, Pengfei
    Song, Jinyue
    Jaeger, Trent
    Mohapatra, Prasant
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1142 - 1155
  • [32] Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs
    Chen, Feng
    Tu, Ri
    Zhang, Yi
    Su, Jinshu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 90 - 94
  • [33] powerLang: a probabilistic attack simulation language for the power domain
    Hacks S.
    Katsikeas S.
    Ling E.
    Lagerström R.
    Ekstedt M.
    Energy Informatics, 2020, 3 (01)
  • [34] Security Assessment of Computer Networks Based on Attack Graphs and Security Events
    Kotenko, Igor
    Doynikova, Elena
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471
  • [35] Using Attack Graphs in Forensic Examinations
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 596 - 603
  • [36] Using attack graphs to design systems
    Gupta, Suvajit
    Winstead, Joel
    IEEE SECURITY & PRIVACY, 2007, 5 (04) : 80 - 83
  • [37] Machine Learning based IoT Edge Node Security Attack and Countermeasures
    Laguduva, Vishalini R.
    Islam, Sheikh Ariful
    Aakur, Sathyanarayanan
    Katkoori, Srinivas
    Karam, Robert
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 672 - 677
  • [38] A Meta Language for Threat Modeling and Attack Simulations
    Johnson, Pontus
    Lagerstrom, Robert
    Ekstedt, Mathias
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [39] The meta attack language-a formal description
    Widel, Wojciech
    Hacks, Simon
    Ekstedt, Mathias
    Johnson, Pontus
    Lagerstrom, Robert
    COMPUTERS & SECURITY, 2023, 130
  • [40] Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
    Levner, Eugene
    Tsadikovich, Dmitry
    ALGORITHMS, 2024, 17 (11)