Academia.eduAcademia.edu

Outline

Identifying a preferred countermeasure strategy for attack graphs

2013, Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop on - CSIIRW '13

https://doi.org/10.1145/2459976.2459988

Abstract

Attack graphs capture sequences of actions that an intruder can take to lead the system to an undesirable state. They have proven to be important tools for administrators to analyse and devise countermeasures to be deployed in the face of an attack. We consider preferences over countermeasures that the administrator may hold when devising a strategy to thwart the attacker's goals. We present a formalism based on CI-nets to represent and reason about such preferences. We present a method to find an intervention strategy in terms of a set of countermeasures that is guaranteed to thwart any attack on the system, which is also most preferred.

References (9)

  1. REFERENCES
  2. Bouveret, S., Endriss, U., and Lang, J. Conditional importance networks: A graphical language for representing ordinal, monotonic preferences over sets of goods. In IJCAI (2009), pp. 67-72.
  3. Brafman, R. I., Domshlak, C., and Shimony, S. E. On graphical modeling of preference and importance. J. Artif. Intell. Res. (JAIR) 25 (2006), 389 Ű-424.
  4. Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., and Tacchella, A. NuSMV Version 2: An OpenSource Tool for Symbolic Model Checking. In Computer-Aided Verification (2002), Springer.
  5. Clarke, E., Grumberg, O., and Peled, D. Model Checking. MIT Press, January 2000.
  6. Jha, S., Sheyner, O., and Wing, J. M. Two formal analyses of attack graphs. In CSFW (2002), pp. 49-63.
  7. Oster, Zachary J., S. G. R., and Basu, S. Automating analysis of qualitative preferences in goal-oriented requirements engineering. Tech. rep., Iowa State University, Dept of Computer Science, 2011.
  8. Oster, Z. J., Santhanam, G. R., and Basu, S. Automating analysis of qualitative preferences in goal-oriented requirements engineering. In ASE (2011), pp. 448-451.
  9. Sheyner, O., Haines, J. W., Jha, S., Lippmann, R., and Wing, J. M. Automated generation and analysis of attack graphs. In IEEE Symposium on Security and Privacy (2002), pp. 273-284.