首页> 外文期刊>Computers & operations research >Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model
【24h】

Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model

机译:拦截攻击图以保护组织免受网络攻击:双层防御者-攻击者模型

获取原文
获取原文并翻译 | 示例

摘要

Today's organizations are inherently open and connected, sharing knowledge and ideas in order to remain innovative. As a result, these organizations are also more vulnerable to information theft through different forms of security breaches caused by hackers and competitors. One way of understanding the vulnerability of an information system is to build and analyze the attack graph of that system. The attack graph of an information system contains all the paths that can be used to penetrate the system in order to breach critical assets. Although existing literature provides an abundance of attack graph generation algorithms, more methods are required to help analyze the attack graphs. In this paper, we study how best to deploy security countermeasures to protect an organization by analyzing the vulnerability of the organization through the use of its attack graph. In particular, we present an approach to find an optimal affordable subset of arcs, called an interdiction plan, on an attack graph that should be protected from attack to minimize the loss due to security breaches. We formulate this problem as a bi-level mixed integer linear program and develop an exact algorithm to solve it. Experiments show that the algorithm is able to solve relatively large problems. Two heuristic methods, one with and the other without a heuristic to solve the master problem and both limiting the master problem branch-and-bound tree to only one node solve the large problems remarkably well. Experiments also reveal that the quality of an interdiction plan is relatively insensitive with respect to the error in the estimate of the attacker's budget, and that the breach loss drops sharply at the beginning, then levels off before finally dropping sharply again with increases in the security budget. (C) 2016 Elsevier Ltd. All rights reserved.
机译:当今的组织固有地开放和联系,共享知识和思想以保持创新。结果,这些组织也更容易受到黑客和竞争对手造成的各种形式的安全漏洞的破坏而导致信息盗窃。了解信息系统漏洞的一种方法是构建和分析该系统的攻击图。信息系统的攻击图包含可用于渗透系统以破坏关键资产的所有路径。尽管现有文献提供了丰富的攻击图生成算法,但仍需要更多方法来帮助分析攻击图。在本文中,我们通过使用组织的攻击图来分析组织的脆弱性,从而研究如何最好地部署安全对策来保护组织。特别是,我们提出了一种在攻击图上找到最优可承受的电弧子集(称为拦截计划)的方法,应保护该子集免受攻击,以最大程度地减少由于安全漏洞而造成的损失。我们将此问题公式化为双层混合整数线性程序,并开发一种精确的算法来解决该问题。实验表明,该算法能够解决较大的问题。有两种启发式方法,一种有启发式方法,另一种没有启发式方法来解决主问题,并且都将主问题的分支定界树限制为仅一个节点,可以很好地解决大问题。实验还显示,拦截计划的质量相对于攻击者预算估计中的错误相对不敏感,并且漏洞损失在开始时就急剧下降,然后趋于平稳,最后随着安全性的提高而再次急剧下降。预算。 (C)2016 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号