Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index

被引:22
作者
Gonzalez-Granadillo, G. [1 ]
Garcia-Alfaro, J. [1 ]
Alvarez, E. [1 ]
El-Barbori, M. [1 ]
Debar, H. [1 ]
机构
[1] Telecom Sudparis, Inst Mines Telecom, CNRS, SAMOVAR,UMR 5157, F-91011 Evry, France
关键词
Attack volume; RORI; Countermeasure selection; Security metrics; Industrial critical control systems; SCADA;
D O I
10.1016/j.compeleceng.2015.07.023
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The impact quantification of attacks and security countermeasures is an active research in the information and communications technology domain. Supporters of the Return On Investment (ROI), and all its variants, propose quantitative models that estimate their parameters based on expert knowledge, statistical data, simulation and risk assessment tools. Although results are used for relative comparisons, a great level of subjectivity is considered while estimating each parameter composing the model. In single attack scenarios, the use of cost sensitive metrics allows the evaluation and selection of security countermeasures. However, for attack attacks against critical infrastructures, this approach is not accurate enough to determine the impact of the equipment(s), subject(s), and/or action(s) that take part in a security incident. This paper proposes, therefore, a geometrical model that represents the volume of systems, attacks and countermeasures based on a three-dimensional coordinate system (i.e., user, channel, and resource). As a result, volumes are related to risks, making it possible to select optimal countermeasures against complex attacks based on a cost-sensitive metric. A case study on a critical infrastructure control process is provided at the end of the paper to show the applicability of our model in a scenario with two attacks. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 34
页数:22
相关论文
共 29 条
  • [1] Abou El Kalam A., 2003, 8 INT WORKSH POL DIS
  • [2] [Anonymous], 2010, INT J NETWORK SECUR
  • [3] Berners-Lee T., 2005, RFC3986
  • [4] Brocke J, 2007, C INF SYST TECHN ITS, P21
  • [5] Cotton M, 2013, SPECIAL PURPOSE IP A
  • [6] Cotton M., 2011, Internet assigned numbers authority (iana) procedures for the management of the service name and transport protocol port number registry
  • [7] CREMONINI M, 2005, 4 WORKSH EC INF SEC
  • [8] Deering S., 1995, Internet Protocol, Version 6 (IPv6) Specification
  • [9] Federation of American Scientists, 1991, SPEC OP FORC INT EL
  • [10] RORI-based countermeasure selection using the OrBAC formalism
    Granadillo, Gustavo Gonzalez
    Belhaouane, Malek
    Debar, Herve
    Jacob, Gregoire
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 63 - 79