Quantitative Penetration Testing with Item Response Theory

被引:0
作者
Arnold, Florian [1 ]
Pieters, Wolter [2 ,3 ]
Stoelinga, Marielle [1 ]
机构
[1] Univ Twente, Dept Comp Sci, Formal Methods Tools Grp, Enschede, Netherlands
[2] Univ Twente, Dept Comp Sci, Cyber Secur & Safety Grp, Serv, Enschede, Netherlands
[3] Delft Univ Technol, Fac Technol, Policy & Management, Delft, Netherlands
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2014年 / 9卷 / 03期
关键词
item response theory; penetration testing; quantitative security; security metrics; socio-technical security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Thus, penetration testing has so far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost-effectiveness of countermeasures, one needs quantitative measures of the feasibility of an attack. Also, when physical or social attack steps are involved, the binary view on whether a vulnerability is present or not is insufficient, and one needs some viability metric. When penetration tests are performed anyway, it is very easy for the testers to keep track of, for example, the time they spend on each attack step. Therefore, this paper proposes the concept of quantitative penetration testing to determine the difficulty rather than the possibility of attacks based on such measurements. We do this by step-wise updates of expected time and probability of success for all steps in an attack scenario. In addition, we show how the skill of the testers can be included to improve the accuracy of the metrics, based on the framework of item response theory (Elo ratings). We prove the feasibility of the approach by means of simulations, and discuss application possibilities.
引用
收藏
页码:118 / 127
页数:10
相关论文
共 29 条
  • [1] Allsopp W., 2009, UNAUTHORISED ACCESS
  • [2] Arnold F., 2013, 9 INT C INF ASS SEC
  • [3] About penetration testing
    Bishop, Matt
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (06) : 84 - 87
  • [4] Blakley B., 2001, P 2001 WORKSH NEW SE, P97
  • [5] Ceraolo, 1996, INFORM SYSTEMS SECUR, V4, P37, DOI https://doi.org/10.1080/10658989609342519
  • [6] Dimkov T, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P399
  • [7] Elo AE., 1978, RATING CHESSPLAYERS
  • [8] Franqueira VNL, 2009, P 24 ANN ACM S APPL, P66
  • [9] Furnell S, 2008, COMPUT FRAUD SECUR, P8, DOI 10.1016/S1361-3723(08)70081-2
  • [10] Gula R., 1999, ENTERASYS NETWORKS