ABSTRACT
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics have generally focused on measuring individual vulnerabilities without considering their combined effects. Our previous work tackle this issue by exploring the causal relationships between vulnerabilities encoded in an attack graph. However, the evolving nature of vulnerabilities and networks has largely been ignored. In this paper, we propose a Dynamic Bayesian Networks (DBNs)-based model to incorporate temporal factors, such as the availability of exploit codes or patches. Starting from the model, we study two concrete cases to demonstrate the potential applications. This novel model provides a theoretical foundation and a practical framework for continuously measuring network security in a dynamic environment.
- P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), 2002. Google ScholarDigital Library
- X. An, D. Jutla, and N. Cercone. Privacy intrusion detection using dynamic bayesian networks. In Proceedings of the 8th International Conference for Electronic Commerce (ICEC'06), pages 208--215, 2006. Google ScholarDigital Library
- Y. Asnar, P. Giorgini, F. Massacci, and N. Zannone. From trust to dependability through risk analysis. In Proceedings of ARES'07, 2007. Google ScholarDigital Library
- Applied Computer Security Associates. Workshop on. In Information Security System Scoring and Ranking, 2001.Google Scholar
- P. Balzarotti, M. Monga, and S. Sicari. Assessing the risk of using vulnerable components. In Proceedings of the 2nd ACM workshop on Quality of protection, 2005.Google Scholar
- T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In Proceedings of the Third European Symposium on Research in Computer Security (ESORICS'94), pages 3--18, 1994. Google ScholarDigital Library
- Common vulnerability scoring system - SIG. available at: http://www.first.org/cvss/, Accessed May 2008.Google Scholar
- M. Frigault and L. Wang. Measuring network security using bayesian network-based attack graphs. In Proceedings of the 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA'08), 2008.Google ScholarCross Ref
- Klaus Havelund and Grigore Roşu. Efficient monitoring of safety properties. Int. J. Softw. Tools Technol. Transf., 6(2):158--173, 2004.Google ScholarCross Ref
- K. S. Hoo. Metrics of network security. White Paper, 2004.Google Scholar
- S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, 2003.Google Scholar
- A. Jaquith. Security Metrics Replacing Fear, Uncertainty, and Doubt. AddisonWesley, 2007. Google ScholarDigital Library
- Y. Liu and H. Man. Network vulnerability assessment using bayesian networks. In Proceedings of SPIE - Data Mining, Intrusion Detection, Information Assurance and Data Networks Security (SPIE'05), pages 61--71, 2005.Google ScholarCross Ref
- K. Manadhata, J. M. Wing, M. A. Flynn, and M. A. McQueen. Measuring the attack surfaces of two ftp daemons. In Quality of Protection Workshop, 2006. Google ScholarDigital Library
- John McHugh. Quality of protection: Measuring the unmeasurable? In Proceedings of QoP (QoP'06), 2006. Google ScholarDigital Library
- V. Mihajlovic and M Petkovic. Dynamic bayesian networks: A state of the art. available at: http://doc.utwente.nl/36632/1/0000006a.pdf.Google Scholar
- National Institute of Standards and Technology. Technology assessment: Methods for measuring the level of computer security. NIST Special Publication 500--133, 1985.Google Scholar
- National vulnerability database. available at: http://www.nvd.org, May 9, 2008.Google Scholar
- J. Pamula, S. Jajodia, P. Ammann, and V. Swarup. A weakest-adversary security metric for network configuration security analysis. In Proceedings of the 2nd ACM workshop on Quality of protection, pages 31--38, New York, NY, USA, 2006. ACM Press. Google ScholarDigital Library
- M .K. Reiter and S. G. Stubblebine. Authentication metric analysis and design. ACM Transactions on Information and System Security, 2(2):138--158, 5 1999. Google ScholarDigital Library
- R. Ritchey and P. Ammann. Using model checking to analyze network vulnerabilities. In Proceedings of the 2000 IEEE Symposium on Research on Security and Privacy (S&P'00), pages 156--165, 2000. Google ScholarDigital Library
- O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P'02), 2002. Google ScholarDigital Library
- M. Swanson, N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. NIST Special Publication 800--55, 2003.Google Scholar
- L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia. An attack graph-based probabilistic security metric. In Proceedings of The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'08), 2008. Google ScholarDigital Library
- L. Wang, S. Noel, and S. Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications, 29(18):3812--3824, 11 2006. Google ScholarDigital Library
- L. Wang, A. Singhal, and S. Jajodia. Measuring network security using attack graphs. In Proceedings of the 3rd ACM workshop on Quality of protection (QoP'07), New York, NY, USA, 2007. ACM Press. Google ScholarDigital Library
- L. Wang, A. Singhal, and S. Jajodia. Measuring the overall security of network configurations using attack graphs. In Proceedings of 21th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'07), 2007.Google ScholarCross Ref
- L. Wang, C. Yao, A. Singhal, and S. Jajodia. Interactive analysis of attack graphs using relational queries. In Proceedings of 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'06), pages 119--132, 2006.Google ScholarCross Ref
Index Terms
- Measuring network security using dynamic bayesian network
Recommendations
Toward measuring network security using attack graphs
QoP '07: Proceedings of the 2007 ACM workshop on Quality of protectionIn measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results. For example, a network with less vulnerabilities or a more diversified ...
An Approach for Security Assessment of Network Configurations Using Attack Graph
NETCOM '09: Proceedings of the 2009 First International Conference on Networks & CommunicationsWith increasing network security threats, the network vulnerability must consider exploits in the context of multistage, multi-host attack scenarios. The general approach to this problem is to construct an attack graph for a given network configuration. ...
A weakest-adversary security metric for network configuration security analysis
QoP '06: Proceedings of the 2nd ACM workshop on Quality of protectionA security metric measures or assesses the extent to which a system meets its security objectives. Since meaningful quantitative security metrics are largely unavailable, the security community primarily uses qualitative metrics for security. In this ...
Comments