skip to main content
10.1145/1978582.1978590acmotherconferencesArticle/Chapter ViewAbstractPublication PagesewdcConference Proceedingsconference-collections
research-article

A simulation-driven approach for assessing risks of complex systems

Authors Info & Claims
Published:11 May 2011Publication History

ABSTRACT

The most critical steps in the risk assessment of a system are the discovery of attacks against the system as well as the computation of the probabilities that attacks are successful and their impacts. We present a framework to support these steps driven by a detailed simulation of the attacks implemented by intelligent threat agents. The framework can evaluate the role of factors such as the probability of discovering a vulnerability, the resources available to agents, how an agent composes attacks into plans to reach a goal. The agents and their plans are described through a proper extension of attack graphs. A simulation defined in terms of attack graphs can fully exploit an important feature of these graphs, namely their ability of describing both attack plans and the countermeasures to stop these plans. Furthermore, a simulation-driven approach can evaluate how the availability of information about the system implementation influences the success of attack plans. Finally, we describe the tools that implement the simulation and that produce statistics about both attack plans that have been successfully implemented and the resulting risk for the system owner.

References

  1. F. Baiardi, C. Telmon, and D. Sgandurra. Hierarchical, Model-based Risk Management of Critical Infrastructures. Reliability Engineering & System Safety, 94(9):1403--1415, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  2. M. Bouissou and J. Bon. A new formalism that combines advantages of fault-trees and Markov models: Boolean logic Driven Markov Processes. Reliability Engineering & System Safety, 82(2):149--163, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. S. Camtepe and B. Yener. Modeling and detection of complex attacks. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pages 234--243. IEEE, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Epstein and A. Rauzy. Can we trust pra? Reliability Engineering & System Safety, 88(3):195--205, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  5. L. A. Gordon and M. P. Loeb. The economics of information security investment. ACM Trans. Inf. Syst. Secur., 5:438--457, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Jha, O. Sheyner, and J. Wing. Two formal analyses of attack graphs. In In Proceedings of the 15th Computer Security Foundation Workshop, pages 49--63, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Lee, D. Grosh, and F. Tillman. Fault tree analysis, methods, and applications- a review. IEEE transactions on reliability, 1985.Google ScholarGoogle Scholar
  8. R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham. Validating and restoring defense in depth using attack graphs. In Proceedings of the 2006 IEEE conference on Military communications, MILCOM'06, pages 981--990, Piscataway, NJ, USA, 2006. IEEE Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Mauw and M. Oostdijk. Foundations of attack trees. Information Security and Cryptology-ICISC 2005, pages 186--198, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Noel, E. Robertson, and S. Jajodia. Correlating intrusion events and building attack scenarios through attack graph distances. In Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC '04, pages 350--359, Washington, DC, USA, 2004. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Pudar, G. Manimaran, and C.-C. Liu. Penet: A practical method and tool for integrated modeling of security attacks and countermeasures. Computers & Security, 28(8):754--771, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 273--, Washington, DC, USA, 2002. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Swiler, C. Phillips, D. Ellis, and S. Chakerian. Computer-attack graph generation tool. In DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01. Proceedings, volume 2, pages 307--321 vol. 2, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Zhang and S. Song. A Novel Attack Graph Posterior Inference Model Based on Bayesian Network. Journal of Information Security, 2:8--27, 2011.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A simulation-driven approach for assessing risks of complex systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        EWDC '11: Proceedings of the 13th European Workshop on Dependable Computing
        May 2011
        106 pages
        ISBN:9781450302845
        DOI:10.1145/1978582

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 May 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader