DocumentCode :
2923241
Title :
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
Author :
Roy, Arpan ; Kim, Dong Seong ; Trivedi, Kishor S.
Author_Institution :
Dept. of Electr. & Comput. Eng., Duke Univ., Durham, NC, USA
fYear :
2012
fDate :
25-28 June 2012
Firstpage :
1
Lastpage :
12
Abstract :
Constraints such as limited security investment cost precludes a security decision maker from implementing all possible countermeasures in a system. Existing analytical model-based security optimization strategies do not prevail for the following reasons: (i) none of these model-based methods offer a way to find optimal security solution in the absence of probability assignments to the model, (ii) methods scale badly as size of the system to model increases and (iii) some methods suffer as they use attack trees (AT) whose structure does not allow for the inclusion of countermeasures while others translate the non-state-space model (e.g., attack response tree) into a state-space model hence causing state-space explosion. In this paper, we use a novel AT paradigm called attack countermeasure tree (ACT) whose structure takes into account attacks as well as countermeasures (in the form of detection and mitigation events). We use greedy and branch and bound techniques to study several objective functions with goals such as minimizing the number of countermeasures, security investment cost in the ACT and maximizing the benefit from implementing a certain countermeasure set in the ACT under different constraints. We cast each optimization problem into an integer programming problem which also allows us to find optimal solution even in the absence of probability assignments to the model. Our method scales well for large ACTs and we compare its efficiency with other approaches.
Keywords :
decision making; greedy algorithms; integer programming; probability; security of data; tree searching; ACT; AT paradigm; analytical model-based security optimization strategy; attack countermeasure trees; branch and bound technique; greedy technique; integer programming problem; limited security investment cost; nonstate-space model; optimal security solution; probability assignments; scalable optimal countermeasure selection; security decision maker; state-space model; Analytical models; Authentication; Investments; Linear programming; Logic gates; Optimization; attack countermeasure tree; branch and bound; integer programming; optimization; security investment cost;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on
Conference_Location :
Boston, MA
ISSN :
1530-0889
Print_ISBN :
978-1-4673-1624-8
Electronic_ISBN :
1530-0889
Type :
conf
DOI :
10.1109/DSN.2012.6263940
Filename :
6263940
Link To Document :
بازگشت