Skip to main content

2018 | OriginalPaper | Buchkapitel

AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection

verfasst von : Igor Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko

Erschienen in: Guide to Vulnerability Analysis for Computer Networks and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter considers methods and techniques for analytical processing of cyber security events and information. The approach suggested in the chapter is based on calculating a set of cyber security metrics suited for automatic- and human-based perception and analysis of cyber situation and suits for automated countermeasure response in a near real-time mode. To fulfil security assessments and make countermeasure decisions, artificial intelligence (AI)-based methods and techniques, including Bayesian, ontological and any-time mechanisms, are implemented. Different kinds of data are used: data from SIEM systems, data accumulated during security monitoring, and data generated by the word community in external databases of attacks, vulnerabilities and incidents for typical and special-purpose computer systems. To calculate integral metrics, the analytical models of evaluation objects are applied. To specify security objects and interrelationships among them, an ontological repository is realised. It joins data from various security databases and specifies techniques of logical inference to get answers on security-related requests. The suggested approach is demonstrated using several case studies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Waltermire D, Quinn S, Scarfone K, Halbardier A (2011) The technical specification for the security content automation protocol (SCAP): vol. 27 Scap version 1.2. (2011) Waltermire D, Quinn S, Scarfone K, Halbardier A (2011) The technical specification for the security content automation protocol (SCAP): vol. 27 Scap version 1.2. (2011)
8.
Zurück zum Zitat Fedorchenko A, Kotenko I, Chechulin A (2015) Design of integrated vulnerabilities database for computer networks security analysis. In: 2015 23rd Euromicro international conference on parallel, distributed and network-based processing (PDP). IEEE, New York (2015), pp 559–566 Fedorchenko A, Kotenko I, Chechulin A (2015) Design of integrated vulnerabilities database for computer networks security analysis. In: 2015 23rd Euromicro international conference on parallel, distributed and network-based processing (PDP). IEEE, New York (2015), pp 559–566
9.
Zurück zum Zitat Fedorchenko A, Kotenko IV, Chechulin A (2015) Integrated repository of security information for network security evaluation. JoWUA 6(2):41–57 Fedorchenko A, Kotenko IV, Chechulin A (2015) Integrated repository of security information for network security evaluation. JoWUA 6(2):41–57
16.
Zurück zum Zitat Kruegel C, Valeur F, Vigna G (2004) Intrusion detection and correlation: challenges and solutions. Springer, USAMATH Kruegel C, Valeur F, Vigna G (2004) Intrusion detection and correlation: challenges and solutions. Springer, USAMATH
17.
Zurück zum Zitat Fedorchenko A, Kotenko I, El Baz D (2017) Correlation of security events based on the analysis of structures of event types. 2017 9th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), vol 1. IEEE, New York, pp 270–276 Fedorchenko A, Kotenko I, El Baz D (2017) Correlation of security events based on the analysis of structures of event types. 2017 9th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), vol 1. IEEE, New York, pp 270–276
18.
Zurück zum Zitat Kotenko I, Chechulin A, Doynikova E, Fedorchenko A (2017) Ontological hybrid storage for security data. International symposium on intelligent and distributed computing. Springer, Berlin, pp 159–171 Kotenko I, Chechulin A, Doynikova E, Fedorchenko A (2017) Ontological hybrid storage for security data. International symposium on intelligent and distributed computing. Springer, Berlin, pp 159–171
19.
Zurück zum Zitat Fedorchenko A, Kotenko I, Doynikova E, Chechulin A (2017) The ontological approach application for construction of the hybrid security repository. In: 2017 XX IEEE international conference on soft computing and measurements (SCM). IEEE, New York (2017), pp 525–528 Fedorchenko A, Kotenko I, Doynikova E, Chechulin A (2017) The ontological approach application for construction of the hybrid security repository. In: 2017 XX IEEE international conference on soft computing and measurements (SCM). IEEE, New York (2017), pp 525–528
20.
Zurück zum Zitat Kotenko IV (2014) Chechulin AA (2014) Fast network attack modelling and security evaluation based on attack graphs. J Cyber Secur Mobil 3(1):27–46CrossRef Kotenko IV (2014) Chechulin AA (2014) Fast network attack modelling and security evaluation based on attack graphs. J Cyber Secur Mobil 3(1):27–46CrossRef
21.
Zurück zum Zitat Doynikova EV, Chechulin AA, Kotenko IV (2017) Analytical attack modelling and security assessment based on the common vulnerability scoring system. In: Proceedings of the 20th conference of open innovations association FRUCT, vol 20 Doynikova EV, Chechulin AA, Kotenko IV (2017) Analytical attack modelling and security assessment based on the common vulnerability scoring system. In: Proceedings of the 20th conference of open innovations association FRUCT, vol 20
23.
Zurück zum Zitat Singhal A, Ou X (2011) Security risk analysis of enterprise networks using probabilistic attack graphs, Nist inter-agency report Singhal A, Ou X (2011) Security risk analysis of enterprise networks using probabilistic attack graphs, Nist inter-agency report
24.
Zurück zum Zitat Kotenko IV, Doynikova EV (2016) Dynamical calculation of security metrics for countermeasure selection in computer networks. In: Proceedings of the 24th Euromicro international conference on parallel. IEEE Computer Society, Los Alamitos, California, pp 558–565 Kotenko IV, Doynikova EV (2016) Dynamical calculation of security metrics for countermeasure selection in computer networks. In: Proceedings of the 24th Euromicro international conference on parallel. IEEE Computer Society, Los Alamitos, California, pp 558–565
26.
Zurück zum Zitat Kotenko I, Stepashkin M (2006) Attack graph based evaluation of network security. IFIP international conference on communications and multimedia security. Springer, Berlin, pp 216–227CrossRef Kotenko I, Stepashkin M (2006) Attack graph based evaluation of network security. IFIP international conference on communications and multimedia security. Springer, Berlin, pp 216–227CrossRef
27.
Zurück zum Zitat Cheng Y, Deng J, Li J, Deloach S, Singhal A, Ou X (2018) Metrics of security Cheng Y, Deng J, Li J, Deloach S, Singhal A, Ou X (2018) Metrics of security
28.
Zurück zum Zitat ISO: ISO/IEC 27005:2011: information technology - security techniques - information security management - monitoring, measurement, analysis and evaluation (2018). Accessed 27 Feb 2018 ISO: ISO/IEC 27005:2011: information technology - security techniques - information security management - monitoring, measurement, analysis and evaluation (2018). Accessed 27 Feb 2018
29.
Zurück zum Zitat Poolsappasit N, Dewri R, Ray I (2012) Dynamic security risk management using bayesian attack graphs. IEEE Trans Depend Sec Comput 9(1):61–74CrossRef Poolsappasit N, Dewri R, Ray I (2012) Dynamic security risk management using bayesian attack graphs. IEEE Trans Depend Sec Comput 9(1):61–74CrossRef
30.
Zurück zum Zitat Frigault M, Wang L, Singhal A, Jajodia S (2008) Measuring network security using dynamic Bayesian network. In: Proceedings of the 4th ACM workshop on quality of protection, ACM, pp 23–30 Frigault M, Wang L, Singhal A, Jajodia S (2008) Measuring network security using dynamic Bayesian network. In: Proceedings of the 4th ACM workshop on quality of protection, ACM, pp 23–30
31.
Zurück zum Zitat Doynikova E, Kotenko I (2017) CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. 2017 25th Euromicro International conference on parallel, distributed and network-based processing (PDP). IEEE, New York, pp 346–353CrossRef Doynikova E, Kotenko I (2017) CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection. 2017 25th Euromicro International conference on parallel, distributed and network-based processing (PDP). IEEE, New York, pp 346–353CrossRef
Metadaten
Titel
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection
verfasst von
Igor Kotenko
Elena Doynikova
Andrey Chechulin
Andrey Fedorchenko
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_5