A stochastic model of attack process for the evaluation of security metrics

被引:27
作者
Almasizadeh, Jaafar [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran 1684613114, Iran
关键词
Cyber security; Attack process; Attack modeling; Security metrics; Quantitative security evaluation; Stochastic modeling; semi-Markov chain;
D O I
10.1016/j.comnet.2013.03.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To trust a computer system that is supposed to be secure, it is necessary to predict the degree to which the system's security level can be achieved when operating in a specific environment under cyber attacks. In this paper, we propose a state-based stochastic model for obtaining quantitative security metrics representing the level of a system's security. The main focus of the study is on how to model the progression of an attack process over time. The basic assumption of our model is that the time parameter plays the essential role in capturing the nature of an attack process. In practice, the attack process will terminate successfully, possibly after a number of unsuccessful attempts. What is important is, indeed, the estimation of how long it takes to be conducted. The proposed stochastic model is parameterized based on a suitable definition of time distributions describing attacker's actions and system's reactions over time. For this purpose, probability distribution functions are defined and assigned to transitions of the model for characterizing the temporal aspects of the attacker and system behavior. With the definition of the distributions, the stochastic model will be recognized to be a semi-Markov chain. This mathematical model will be analytically solved to calculate the desirable quantitative security metrics, such as mean time to security failure and steady-state security. The proposed method shows a systematic development of the stochastic modeling techniques and concepts, used frequently in the area of dependability evaluation, for attack process modeling. Like any other modeling method, the proposed model is also constructed based on some underlying assumptions, which are specific to the context of security analysis. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:2159 / 2180
页数:22
相关论文
共 43 条
  • [1] Almasizadeh J., 2009, T COMPUTATIONAL SCI, V4
  • [2] Intrusion Process Modeling for Security Quantification
    Almasizadeh, Jaafar
    Azgomi, Mohammad Abdollahi
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 114 - 121
  • [3] [Anonymous], 2001, Probability and statistics with reliability, queueing, and computer science applications
  • [4] [Anonymous], 2005, Technical Report
  • [5] [Anonymous], 1 WORKSH QUAL PROT Q
  • [6] [Anonymous], P 23 S REL DISTR SYS
  • [7] [Anonymous], 2008, IEEE INFOCOM 2008 TH
  • [8] [Anonymous], INT C DEP SYST NETW
  • [9] Probabilistic model checking for the quantification of DoS security threats
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    Alexiou, Nikolaos
    [J]. COMPUTERS & SECURITY, 2009, 28 (06) : 450 - 465
  • [10] Risk assessment in practice: A real case study
    Benini, Marco
    Sicari, Sabrina
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (15) : 3691 - 3699