首页> 外文会议>European Symposium on Research in Computer Security >Efficient Numerical Frameworks for Multi-objective Cyber Security Planning
【24h】

Efficient Numerical Frameworks for Multi-objective Cyber Security Planning

机译:有效的多目标网络安全规划数值框架

获取原文

摘要

We consider the problem of optimal investment in cyber-security by an enterprise. Optimality is measured with respect to the overall (1) monetary cost of implementation, (2) negative side-effects of cyber-security controls (indirect costs), and (3) mitigation of the cyber-security risk. We consider "passive" and "reactive" threats, the former representing the case where attack attempts are independent of the defender's plan, the latter, where attackers can adapt and react to an implemented cyber-security defense. Moreover, we model in three different ways the combined effect of multiple cyber-security controls, depending on their degree of complementarity and correlation. We also consider multi-stage attacks and the potential correlations in the success of different stages. First, we formalize the problem as a non-linear multi-objective integer programming. We then convert them into Mixed Integer Linear Programs (MILP) that very efficiently solve for the exact Pareto-optimal solutions even when the number of available controls is large. In our case study, we consider 27 of the most typical security controls, each with multiple intensity levels of implementation, and 37 common vulnerabilities facing a typical SME. We compare our findings against expert-recommended critical controls. We then investigate the effect of the security models on the resulting optimal plan and contrast the merits of different security metrics. In particular, we show the superior robustness of the security measures based on the "reactive" threat model, and the significance of the hitherto overlooked role of correlations.
机译:我们考虑企业对网络安全最佳投资的问题。关于整体(1)个货币成本来衡量最优性,(2)网络安全控制(间接成本)的负面副作用,以及(3)减轻网络安全风险。我们认为“被动”和“反应性”威胁,前者代表攻击企图独立于后卫计划的情况,后者,攻击者可以适应和对实施的网络安全防御作出反应。此外,我们以三种不同的方式模型多种网络安全控制的组合效果,这取决于其互补性和相关性。我们还考虑了不同阶段成功的多阶段攻击和潜在的相关性。首先,我们将问题正式为非线性多目标整数编程。然后,我们将它们转换为混合整数线性程序(MILP),即使当可用控件的数量大时,也非常有效地解决了精确的帕累托最佳解决方案。在我们的案例研究中,我们考虑了27个最典型的安全控制,每个安全控制都有多种强度的实现,以及面临典型的中小企业的37个常见漏洞。我们将我们的调查结果与专家推荐的关键控件进行比较。然后,我们调查安全模型对结果的最佳计划的影响,并对比不同安全度量的优点。特别是,我们展示了基于“反应性”威胁模型的安全措施的优越稳健性,以及迄今为止忽视相关性的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号