Title :
Network security risk mitigation using Bayesian decision networks
Author :
Khosravi-Farmad, Masoud ; Rezaee, Razieh ; Harati, A. ; Bafghi, Abbas Ghaemi
Author_Institution :
Comput. Eng. Dept., Ferdowsi Univ. of Mashhad, Mashhad, Iran
Abstract :
Network security risk assessment and mitigation are two processes in the risk management framework which need to be done accurately to improve the overall security level of a network. In this paper, in order to increase the accuracy of vulnerability exploitation probability estimation in the risk assessment phase, in addition to inherent characteristics of vulnerabilities, their temporal characteristics are also considered. In the risk mitigation phase, Bayesian decision networks are used to model interconnections between vulnerabilities that enable the attacker to achieve a particular goal, the security countermeasures covering these vulnerabilities, their cost of implementation and resulted outcome. Using Bayesian decision networks, our approach yields scalability and integration of risk assessment and mitigation processes. A cost-benefit analysis is done to identify the minimum-cost hardening security measures in situations where the allocated budget for network security hardening is limited. The experimental results show that the proposed method effectively improves the security level of a test network in terms of determining the optimal security risk mitigation plans.
Keywords :
belief networks; computer network security; cost-benefit analysis; risk management; Bayesian decision networks; cost-benefit analysis; minimum-cost hardening security measures; network security hardening; network security risk assessment; network security risk mitigation; optimal security risk mitigation plans; risk management framework; security countermeasures; temporal characteristics; vulnerability exploitation probability estimation; Bayes methods; Communication networks; Equations; Measurement; Risk management; Security; Attack graphs; Bayesian decision networks; CVSS framework; Security risk mitigation; Vulnerability;
Conference_Titel :
Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on
Conference_Location :
Mashhad
Print_ISBN :
978-1-4799-5486-5
DOI :
10.1109/ICCKE.2014.6993444