首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
【24h】

Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees

机译:可扩展的最佳对策选择使用隐式枚举攻击对策树木

获取原文

摘要

Constraints such as limited security investment cost precludes a security decision maker from implementing all possible countermeasures in a system. Existing analytical model-based security optimization strategies do not prevail for the following reasons: (i) none of these model-based methods offer a way to find optimal security solution in the absence of probability assignments to the model, (ii) methods scale badly as size of the system to model increases and (iii) some methods suffer as they use attack trees (AT) whose structure does not allow for the inclusion of countermeasures while others translate the non-state-space model (e.g., attack response tree) into a state-space model hence causing state-space explosion. In this paper, we use a novel AT paradigm called attack countermeasure tree (ACT) whose structure takes into account attacks as well as countermeasures (in the form of detection and mitigation events). We use greedy and branch and bound techniques to study several objective functions with goals such as minimizing the number of countermeasures, security investment cost in the ACT and maximizing the benefit from implementing a certain countermeasure set in the ACT under different constraints. We cast each optimization problem into an integer programming problem which also allows us to find optimal solution even in the absence of probability assignments to the model. Our method scales well for large ACTs and we compare its efficiency with other approaches.
机译:限制,如限制证券投资成本排除了从系统中实现所有可能的对策安全决策者。现有的分析基于模型的安全优化策略不占上风,原因如下:(一)没有这些基于模型的方法提供了一种方法,以找到在没有概率分配到模型中最佳的安全解决方案,(二)方法扩展严重作为该系统的尺寸模型增加及(iii)一些方法受苦,因为他们使用的攻击树(AT),其结构不允许列入对策,而其他翻译非状态空间模型(例如,攻击响应树)进入状态空间模型从而导致状态空间爆炸。在本文中,我们使用了一种新的AT范例,称之为攻击对策树(ACT),其结构应该考虑到攻击以及对策(中检测和缓解事件的形式)。我们用贪婪和分支和绑定技术来研究一些客观的功能与目标,如减少措施的数量,在ACT安全的投资成本和实施中根据不同的约束ACT一定的对策集最大化的利益。我们投的每个优化问题转化为整数规划问题,这也让我们找到最佳的解决方案,甚至在没有概率分配到模型。我们的方法很好地进行扩展为大ACT和我们比较其效率与其他的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号