首页> 外文期刊>Journal of Information Security Research >Security Countermeasures Selection Using Attack Graphs
【24h】

Security Countermeasures Selection Using Attack Graphs

机译:使用攻击图选择安全对策

获取原文
获取原文并翻译 | 示例
           

摘要

Enterprise organizations expend significant resources on security countermeasures to make sure that their networks are protected. Risk analysis is one area of information security research that aims to help organizations in making quick decisions and preventing attackers from compromising their networks. Here we use attack graphs to both display possible attack vectors in simple systems and as an analysis tool for more complex systems. This can be used within a risk analysis strategy. System administrators face constant challenges when they have to decide what countermeasures they must deploy taking into account the minimum budget to deploy a set of countermeasures. The attack graph approach used here aims to minimize the cost of deploying countermeasures. Specifically we develop an approach to find the minimum cut set in dependency attack graphs using a genetic algorithm (GA). We also combine the GA with a local search algorithm to improve the performance of the GA. The minimum cut set is a natural graph representation describing a set of security countermeasures that prevent attackers reaching their targets. More importantly, this work considers shared security countermeasures that are deployed in more than one place in the attack graph. Therefore, there may be one security countermeasure that can fix multiple vulnerabilities. Alternatively, there may be a vulnerability or an exploit in the attack graph that can be stopped by one of multiple countermeasures. The work shows that the problem maps naturally to a binary encoded GA and gives good results without the need to deploy problem specific GA operators.
机译:企业组织将大量资源用于安全对策,以确保其网络受到保护。风险分析是信息安全研究的一个领域,旨在帮助组织做出快速决策并防止攻击者破坏其网络。在这里,我们使用攻击图既显示简单系统中可能的攻击向量,又用作更复杂系统的分析工具。这可以在风险分析策略中使用。当系统管理员必须考虑必须部署一套对策的最低预算来决定必须部署哪些对策时,系统管理员面临着不断的挑战。此处使用的攻击图方法旨在最小化部署对策的成本。具体来说,我们开发了一种使用遗传算法(GA)在依赖攻击图中找到最小割集的方法。我们还将GA与本地搜索算法结合起来,以提高GA的性能。最小割集是一个自然的图形表示形式,描述了防止攻击者到达目标的一组安全对策。更重要的是,这项工作考虑了在攻击图中多个位置部署的共享安全对策。因此,可能存在一种可以解决多个漏洞的安全对策。或者,可以通过多种对策之一阻止攻击图中的漏洞或利用。这项工作表明,问题自然映射到二进制编码的GA,并且无需部署特定于问题的GA运算符即可获得良好的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号