首页> 外文期刊>Journal of High Speed Networks >Security modeling and quantification of intrusion tolerant systems using attack-response graph
【24h】

Security modeling and quantification of intrusion tolerant systems using attack-response graph

机译:使用攻击响应图的入侵容忍系统的安全建模和量化

获取原文
获取原文并翻译 | 示例
           

摘要

Increasing deployment of computer systems in critical applications has made study and quantifiable analysis of the security aspects of these systems an important issue. Security quantification analysis can either he done by fogging large amounts of operational data and analyzing this data or by developing analytic models. First approach, though straight forward, is less desirable, since such an analysis is typically done in a post-facto manner, after the damage caused by a security breach has already occurred. The modeling approach, on the other hand, can be done in an a-priori manner and is also much less costly. Another aspect of designing secure systems that is gaining acceptance is that while preventing security attacks is an important goal, it is not always possible to be able to prevent all types of attacks, particularly since attackers are always creating newer attacks. Recent approaches to designing dependable systems suggest treating intrusion prevention as a first line of defense to be followed by building intrusion tolerance measures that do not entirely preclude the possibility of security intrusion from succeeding. Such systems take appropriate responsive measures to mitigate the adverse effects of security intrusions. In this paper, we utilize the attack or privilege graph models that have been successfully used to model the attack progression to incorporate the system's response to an attack and for verifying if the system is secure or not. The proposed model is referred to as the attack response graph. Security quantification uses a Markov chain model to compute mean time taken to reach security failed states. However, getting to the Markov chain directly is rather difficult. Instead, we first obtain the SPN from the ARG description. The reachability graph of this SPN gives the absorbing state Markov chain which in turn is used to quantify the security in terms of the mean-time-to-security-failure measure for an intrusion tolerant system. Finally, we utilize sensitivity analysis to evaluate the effects of inaccuracies in estimating the model parameters.
机译:在关键应用程序中越来越多地部署计算机系统,使得对这些系统的安全性方面的研究和量化分析成为重要的问题。安全量化分析既可以通过雾化大量操作数据并进行分析来完成,也可以通过开发分析模型来完成。尽管直截了当,但第一种方法却不太理想,因为在安全漏洞造成的损害已经发生之后,这种分析通常以事后方式进行。另一方面,建模方法可以先验地完成,并且成本也低得多。设计安全系统获得认可的另一个方面是,尽管防止安全攻击是一个重要的目标,但并非总是能够阻止所有类型的攻击,尤其是由于攻击者始终在发起更新的攻击。设计可靠系统的最新方法建议将入侵防御作为第一道防线,然后再制定入侵容忍措施,这些措施不能完全排除成功进行安全入侵的可能性。这样的系统采取适当的响应措施来减轻安全入侵的不利影响。在本文中,我们利用已经成功用于对攻击进行建模的攻击或特权图模型,以合并系统对攻击的响应并验证系统是否安全。提出的模型称为攻击响应图。安全量化使用马尔可夫链模型来计算达到安全失败状态所需的平均时间。但是,直接进入马尔可夫链非常困难。相反,我们首先从ARG描述中获得SPN。此SPN的可达性图给出了吸收状态马尔可夫链,该马尔可夫链又用于根据入侵容忍系统的平均安全失效时间度量来量化安全性。最后,我们利用敏感性分析来评估模型参数估计中不准确的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号