DocumentCode :
1018598
Title :
A Stochastic Model for Quantitative Security Analyses of Networked Systems
Author :
Li, Xiaohu ; Parker, Timothy Paul ; Xu, Shouhuai
Author_Institution :
Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
Volume :
8
Issue :
1
fYear :
2011
Firstpage :
28
Lastpage :
43
Abstract :
Traditional security analyses are often geared toward cryptographic primitives or protocols. Although such analyses are necessary, they cannot address a defender´s need for insight into which aspects of a networked system having a significant impact on its security, and how to tune its configurations or parameters so as to improve security. This question is known to be notoriously difficult to answer, and the state of the art is that we know little about it. Toward ultimately addressing this question, this paper presents a stochastic model for quantifying security of networked systems. The resulting model captures two aspects of a networked system: (1) the strength of deployed security mechanisms such as intrusion detection systems and (2) the underlying vulnerability graph, which reflects how attacks may proceed. The resulting model brings the following insights: (1) How should a defender “tune” system configurations (e.g., network topology) so as to improve security? (2) How should a defender “tune” system parameters (e.g., by upgrading which security mechanisms) so as to improve security? (3) Under what conditions is the steady-state number of compromised entities of interest below a given threshold with a high probability? Simulation studies are conducted to confirm the analytic results, and to show the tightness of the bounds of certain important metric that cannot be resolved analytically.
Keywords :
cryptography; stochastic processes; cryptographic primitives; intrusion detection systems; networked systems; quantitative security analyses; security analysis; security mechanisms; steady-state number; stochastic model; vulnerability graph; Analytical models; Authentication; Computer networks; Computer science; Cryptographic protocols; Cryptography; Intrusion detection; Network topology; Steady-state; Stochastic systems; Security modeling; networked systems; quantitative security analysis; security metric.; vulnerability graph;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2008.75
Filename :
4695835
Link To Document :
بازگشت