Skip to main content

Uncertainty and Risk Management in Cyber Situational Awareness

  • Chapter
  • First Online:
Cyber Situational Awareness

Part of the book series: Advances in Information Security ((ADIS,volume 46))

Abstract

Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ehab Al-Shaer, Latif Khan, and M. Salim Ahmed. A comprehensive objective network security metric framework for proactive security configuration. In ACM Cyber Security and Information Intelligence Research Workshop, 2008.

    Google Scholar 

  2. Magnus Almgren, Ulf Lindqvist, and Erland Jonsson. A multi-sensor model to improve automated attack detection. In 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008). RAID, September 2008.

    Google Scholar 

  3. Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.

    Google Scholar 

  4. Stefan Axelsson. A preliminary attempt to apply detection and estimation theory to intrusion detection. Technical report, Chalmers Univ. of Technology, 2000.

    Google Scholar 

  5. R. Baldwin. Rule based analysis of computer security. Technical Report TR-401, MIT LCS Lab, 1988.

    Google Scholar 

  6. Davide Balzarotti, Mattia Monga, and Sabrina Sicari. Assessing the risk of using vulnerable components. In Proceedings of the 2nd ACM workshop on Quality of protection, 2005.

    Google Scholar 

  7. Steven Cheung, Ulf Lindqvist, and Martin W Fong. Modeling multistep cyber attacks for scenario recognition. In DARPA Information Survivability Conference and Exposition (DISCEX III), pages 284–292, Washington, D.C., 2003.

    Google Scholar 

  8. Elizabeth Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, and Will Robinson. Performance Measurement Guide for Information Security. National Institute of Standards and Technology, July 2008. NIST Special Publication 800-55 Revision 1.

    Google Scholar 

  9. Frédéric Cuppens and Alexandre Miège. Alert correlation in a cooperative intrusion detection framework. In IEEE Symposium on Security and Privacy, 2002.

    Google Scholar 

  10. J. Dawkins and J. Hale. A systematic approach to multi-stage network attack analysis. In Proceedings of Second IEEE International Information Assurance Workshop, pages 48 – 56, April 2004.

    Google Scholar 

  11. Dorothy Denning. An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2), 1987.

    Google Scholar 

  12. Daniel Farmer and Eugene H. Spafford. The COPS security checker system. Technical Report CSD-TR-993, Purdue University, September 1991.

    Google Scholar 

  13. William L. Fithen, Shawn V. Hernan, Paul F. O’Rourke, and David A. Shinberg. Formal modeling of vulnerabilities. Bell Labs technical journal, 8(4):173–186, 2004.

    Article  Google Scholar 

  14. Prahlad Fogla and Wenke Lee. Evading network anomaly detection systems: Formal reasoning and practical techniques. In Proceedings of The 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, October 2006.

    Google Scholar 

  15. Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, and Wenke Lee. Polymorphic blending attacks. In Proceedings of The 15th USENIX Security Symposium, Vancouver, B.C., Canada, August 2006.

    Google Scholar 

  16. Marcel Frigault, Lingyu Wang, Anoop Singhal, and Sushil Jajodia. Measuring network security using dynamic bayesian network. In Proceedings of the 4th ACM workshop on Quality of protection, 2008.

    Google Scholar 

  17. Paul Helman and Gunar Liepins. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering, 19(9), 1993.

    Google Scholar 

  18. Kyle Ingols, Richard Lippmann, and Keith Piwowarski. Practical attack graph generation for network defense. In 22nd Annual Computer Security Applications Conference (ACSAC), Miami Beach, Florida, December 2006.

    Google Scholar 

  19. Sushil Jajodia, Steven Noel, and Brian O’Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.

    Google Scholar 

  20. Somesh Jha, Oleg Sheyner, and Jeannette M. Wing. Two formal analyses of attack graphs. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 49–63, Nova Scotia, Canada, June 2002.

    Google Scholar 

  21. Daniel Geer Jr., Kevin Soo Hoo, and Andrew Jaquith. Information security: Why the future belongs to the quants. IEEE SECURITY & PRIVACY, 2003.

    Google Scholar 

  22. Gene H. Kim and Eugene H. Spafford. The design and implementation of tripwire: A file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and Communications Security (CCS), 1994.

    Google Scholar 

  23. Kenneth Konyndyk. Introductory Modal Logic. University of Notre Dame Press, 1986.

    Google Scholar 

  24. Jason Li, Peng Liu, and Xinming Ou. Using Bayesian Networks for cyber security analysis. Manusrcipt, 2008.

    Google Scholar 

  25. Wei Li, Rayford B. Vaughn, and Yoginder S. Dandass. An approach to model network exploitations using exploitation graphs. SIMULATION, 82(8):523–541, 2006.

    Article  Google Scholar 

  26. Richard Lippmann, Kyle Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Mike Artz, and Robert Cunningham. Validating and restoring defense in depth using attack graphs. In Military Communications Conference (MILCOM), Washington, DC, U.S.A., October 2006.

    Google Scholar 

  27. Richard Lippmann and Kyle W. Ingols. An annotated review of past papers on attack graphs. Technical report, MIT Lincoln Laboratory, March 2005.

    Google Scholar 

  28. Pratyusa Manadhata, Jeannette Wing, Mark Flynn, and Miles McQueen. Measuring the attack surfaces of two FTP daemons. In Proceedings of the 2nd ACM workshop on Quality of protection, 2006.

    Google Scholar 

  29. John McHugh. Quality of protection: measuring the unmeasurable? In Proceedings of the 2nd ACM workshop on Quality of protection (QoP), Alexandria, Virginia, USA, 2006.

    Google Scholar 

  30. John McHugh and James Tippett, editors. Workshop on Information-Security-System Rating and Ranking (WISSRR). Applied Computer Security Associates, May 2001.

    Google Scholar 

  31. Peter Mell, Karen Scarfone, and Sasha Romanosky. A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Forum of Incident Response and Security Teams (FIRST), June 2007.

    Google Scholar 

  32. Gaspar Modelo-Howard, Saurabh Bagchi, and Guy Lebanon. Determining placement of intrusion detectors for a distributed application through bayesian network modeling. In 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008). RAID, September 2008.

    Google Scholar 

  33. Benjamin Morin, Hervé, and Mireille Ducassé. M2d2: A formal data model for ids alert correlation. In 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 115–137, 2002.

    Google Scholar 

  34. National Institute of Standards and Technology. Technology assessment: Methods for measuring the level of computer security, 1985. NIST Special Publication 500-133.

    Google Scholar 

  35. Peng Ning, Yun Cui, Douglas Reeves, and Dingbang Xu. Tools and techniques for analyzing intrusion alerts. ACM Transactions on Information and System Security, 7(2):273–318, May 2004.

    Google Scholar 

  36. Steven Noel, Sushil Jajodia, Brian O’Berry, and Michael Jacobs. Efficient minimum-cost network hardening via exploit dependency graphs. In 19th Annual Computer Security Applications Conference (ACSAC), December 2003.

    Google Scholar 

  37. Steven Noel, Eric Robertson, and Sushil Jajodia. Correlating intrusion events and building attack scenarios through attack graph distances. In 20th Annual Computer Security Applications Conference (ACSAC 2004), pages 350– 359, 2004.

    Google Scholar 

  38. Xinming Ou, Wayne F. Boyer, and Miles A. McQueen. A scalable approach to attack graph generation. In 13th ACM Conference on Computer and Communications Security (CCS), pages 336–345, 2006.

    Google Scholar 

  39. Xinming Ou, Sudhakar Govindavajhala, and Andrew W. Appel. MulVAL: A logic-based network security analyzer. In 14th USENIX Security Symposium, 2005.

    Google Scholar 

  40. Xinming Ou, Raj Rajagopalan, and Sakthiyuvaraja Sakthivelmurugan. A practical approach to modeling uncertainty in intrusion analysis. Technical report, Department of Computing and Information Sciences, Kansas State University, 2008.

    Google Scholar 

  41. Xinming Ou, S. Raj Rajagopalan, Abhishek Rakshit, and Sakthiyuvaraja Sakthivelmurugan. An empirical approach to modeling uncertainty in intrusion analysis. Under review, February 2009.

    Google Scholar 

  42. Joseph Pamula, Sushil Jajodia, Paul Ammann, and Vipin Swarup. A weakest-adversary security metric for network configuration security analysis. In Proceedings of the 2nd ACM workshop on Quality of protection, 2006.

    Google Scholar 

  43. Judea Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufman, 1999.

    Google Scholar 

  44. Cynthia Phillips and Laura Painton Swiler. A graph-based system for network-vulnerability analysis. In NSPW ’98: Proceedings of the 1998 workshop on New security paradigms, pages 71–79. ACM Press, 1998.

    Google Scholar 

  45. C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1-2):189–209, 2002.

    Google Scholar 

  46. Diptikalyan Saha. Extending logical attack graphs for efficient vulnerability analysis. In Proceedings of the 15th ACM conference on Computer and Communications Security (CCS), 2008.

    Google Scholar 

  47. Mohamed Salim, Ehab Al-Shaer, and Latif Khan. A novel quantitative approach for measuring network security. In INFOCOM 2008 Mini Conference, 2008.

    Google Scholar 

  48. Reginald Sawilla and Xinming Ou. Identifying critical attack assets in dependency attack graphs. In 13th European Symposium on Research in Computer Security (ESORICS), Malaga, Spain, October 2008.

    Google Scholar 

  49. Mike Schiffman, Gerhard Eschelbeck, David Ahmad, Andrew Wright, and Sasha Romanosky. CVSS: A Common Vulnerability Scoring System. National Infrastructure Advisory Council (NIAC), 2004.

    Google Scholar 

  50. Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 254–265, 2002.

    Google Scholar 

  51. Laura P. Swiler, Cynthia Phillips, David Ellis, and Stefan Chakerian. Computer-attack graph generation tool. In DARPA Information Survivability Conference and Exposition (DISCEX II’01), volume 2, June 2001.

    Google Scholar 

  52. Steven J. Templeton and Karl Levitt. A requires/provides model for computer attacks. In Proceedings of the 2000 workshop on New security paradigms, pages 31–38. ACM Press, 2000.

    Google Scholar 

  53. T. Tidwell, R. Larson, K. Fitch, and J. Hale. Modeling Internet attacks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001.

    Google Scholar 

  54. Fredrik Valeur, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer. A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing, 1(3):146–169, 2004.

    Article  Google Scholar 

  55. Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, and Sushil Jajodia. An attack graph-based probabilistic security metric. In Proceedings of The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC’08), 2008.

    Google Scholar 

  56. Lingyu Wang, Anoop Singhal, and Sushil Jajodia. Measuring network security using attack graphs. In Third Workshop on Quality of Protection (QoP), 2007.

    Google Scholar 

  57. Lingyu Wang, Anoop Singhal, and Sushil Jajodia. Measuring the overall security of network configurations using attack graphs. In Proceedings of 21th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC’07), 2007.

    Google Scholar 

  58. Yan Zhai, Peng Ning, Purush Iyer, and Douglas S. Reeves. Reasoning about complementary intrusion evidence. In Proceedings of 20th Annual Computer Security Applications Conference (ACSAC), pages 39–48, December 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag US

About this chapter

Cite this chapter

Li, J., Ou, X., Rajagopalan, R. (2010). Uncertainty and Risk Management in Cyber Situational Awareness. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds) Cyber Situational Awareness. Advances in Information Security, vol 46. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-0140-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-0140-8_4

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-0139-2

  • Online ISBN: 978-1-4419-0140-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics