skip to main content
10.1145/2459976.2459988acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Identifying a preferred countermeasure strategy for attack graphs

Published: 08 January 2013 Publication History

Abstract

Attack graphs capture sequences of actions that an intruder can take to lead the system to an undesirable state. They have proven to be important tools for administrators to analyse and devise countermeasures to be deployed in the face of an attack. We consider preferences over countermeasures that the administrator may hold when devising a strategy to thwart the attacker's goals. We present a formalism based on CI-nets to represent and reason about such preferences. We present a method to find an intervention strategy in terms of a set of countermeasures that is guaranteed to thwart any attack on the system, which is also most preferred.

References

[1]
Bouveret, S., Endriss, U., and Lang, J. Conditional importance networks: A graphical language for representing ordinal, monotonic preferences over sets of goods. In IJCAI (2009), pp. 67--72.
[2]
Brafman, R. I., Domshlak, C., and Shimony, S. E. On graphical modeling of preference and importance. J. Artif. Intell. Res. (JAIR) 25 (2006), 389--424.
[3]
Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., and Tacchella, A. NuSMV Version 2: An OpenSource Tool for Symbolic Model Checking. In Computer-Aided Verification (2002), Springer.
[4]
Clarke, E., Grumberg, O., and Peled, D. Model Checking. MIT Press, January 2000.
[5]
Jha, S., Sheyner, O., and Wing, J. M. Two formal analyses of attack graphs. In CSFW (2002), pp. 49--63.
[6]
Oster, Zachary J., S. G. R., and Basu, S. Automating analysis of qualitative preferences in goal-oriented requirements engineering. Tech. rep., Iowa State University, Dept of Computer Science, 2011.
[7]
Oster, Z. J., Santhanam, G. R., and Basu, S. Automating analysis of qualitative preferences in goal-oriented requirements engineering. In ASE (2011), pp. 448--451.
[8]
Sheyner, O., Haines, J. W., Jha, S., Lippmann, R., and Wing, J. M. Automated generation and analysis of attack graphs. In IEEE Symposium on Security and Privacy (2002), pp. 273--284.

Cited By

View all
  • (2024)Automated APT Defense Using Reinforcement Learning and Attack Graph Risk-based Situation AwarenessProceedings of the Workshop on Autonomous Cybersecurity10.1145/3689933.3690834(23-33)Online publication date: 6-Nov-2024
  • (2023)Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production SystemsACM Computing Surveys10.1145/355910455:9(1-36)Online publication date: 16-Jan-2023
  • (2022)Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.304199919:3(1936-1954)Online publication date: 1-May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)3
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Automated APT Defense Using Reinforcement Learning and Attack Graph Risk-based Situation AwarenessProceedings of the Workshop on Autonomous Cybersecurity10.1145/3689933.3690834(23-33)Online publication date: 6-Nov-2024
  • (2023)Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production SystemsACM Computing Surveys10.1145/355910455:9(1-36)Online publication date: 16-Jan-2023
  • (2022)Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.304199919:3(1936-1954)Online publication date: 1-May-2022
  • (2021)Heuristic Approach for Countermeasure Selection Using Attack Graphs2021 IEEE 34th Computer Security Foundations Symposium (CSF)10.1109/CSF51468.2021.00003(1-16)Online publication date: Jun-2021
  • (2016)Planning Cyberspace DeceptionIntroduction to Cyberdeception10.1007/978-3-319-41187-3_12(161-187)Online publication date: 24-Sep-2016
  • (2015)Scalable modeling and analysis of requirements preferences: A qualitative approach using CI-Nets2015 IEEE 23rd International Requirements Engineering Conference (RE)10.1109/RE.2015.7320425(214-219)Online publication date: Aug-2015
  • (2015)Iterative Selection of Cost-Effective Countermeasures for Intelligent Threat AgentsProceedings of the 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing10.1109/PDP.2015.20(595-599)Online publication date: 4-Mar-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media