Academia.eduAcademia.edu

Outline

Using CP-nets as a guide for countermeasure selection

2007

https://doi.org/10.1145/1244002.1244073

Abstract

In this paper we present a qualitative approach for the selection of security countermeasures able to protect an IT system from attacks. For this purpose, we model security scenarios by using defense trees (an extension of attack trees) and preferences over countermeasure using Conditional Preference networks (CP-nets for short). In particular, we introduce two different methods for the composition of preferences: the and-composition and the or-composition. The first one is used to determine a preference order in the selection of countermeasures able to mitigate the risks produced by conjunct attacks. The second one is used to determine a preference order over sets of countermeasures able to mitigate the risks produced by alternative attacks.

References (14)

  1. REFERENCES
  2. S. Bistarelli, F. Fioravanti, and P. Peretti. Defense tree for economic evaluations of security investment. In ARES06, pages 416-423, 2006.
  3. C. Boutilier, R. I. Brafman, H. H. Hoos, and D. Poole. Reasoning with conditional ceteris paribus preference statements. In UAI-99, pages 71-80, 1999.
  4. W. J. Caelli, D. Longley, and A. B. Tickle. A methodology for describing information and physical security architectures. In IFIP/Sec'92, pages 277-296. North-Holland, 1992.
  5. N. L. Foster. The application of software and safety engineering techniques to security protocol development. PhD thesis, Univ. of York, Dep. of Computer Science, 2002.
  6. J. Gordon. Vurisk. http://www.conceptlabs.co.uk/.
  7. M. Howard and D. C. LeBlanc. Writing Secure Code. Microsoft Press, 2002.
  8. A. Moore, R. Ellison, and R. Linger. Attack modeling for information security and survivability. Technical report, Soft. Eng. Inst. CMU/SEI-2001-TN-001, 2001.
  9. M. S. Pini, F. Rossi, and K. B. Venable. Possibility theory for reasoning about uncertain soft constraints. In ECSQARU, pages 800-811, 2005.
  10. N. C. Rasmussen. Reactor safety study: An assessment of accident risks in us commercial nuclear power plants. Technical report, Nuclear Regulatory commission, 1975.
  11. S. E. Schechter. Computer Security Strength & Risk: A Quantitative Approach. PhD thesis, Harvard University, 2004.
  12. B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, 1999.
  13. T. Srivatanakul. Security Analysis with deviational techniques. PhD thesis, Univ. of Cork, Dep. of Computer Science, 2005.
  14. H. A. Watson. Launch control safety study. Technical report, Bell Telephone Laboratories, 1961.