Automatic security management of smart infrastructures using attack graph and risk analysis

被引:0
作者
Ivanov, Denis [1 ]
Kalinin, Maxim [1 ]
Krudyshev, Vasiliy [1 ]
Orel, Evgeniy [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, St Petersburg, Russia
来源
PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020) | 2020年
关键词
attack graph; cyber risk; infrastructure; protective measures; risk assessment; security analysis; smart environment;
D O I
10.1109/worlds450073.2020.9210410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart infrastructure integrates cyberphysical systems, self-organizing networks of devices, fog computing to enhance the quality and convenience of manufacturing and social life, providing, efficient resource management and increasing productivity and availability of traditional services. New technologies are characterized with a high degree of heterogeneity, structural complexity, and dynamic topology that result in a large number of new information and cyber security threats. Given a high degree of integration of digital cyber space into the processes of management, monitoring, aggregation, and data transferring, an assessment of its security level is a necessary requirement to maintain and control a safe and reliable environment for handling data and performing physical processes. Risk analysis and assessment is an extremely important task at all stages of the life cycle of subsystems and components of the smart environment. It allows us to assess a level of protection, identify vulnerable assets, and counteract the most likely directions of security threats. The known methods for security risk assessment do not consider the features of modern smart technologies, and this forces us to search for new approaches. This paper proposes a comprehensive method that includes a calculation of security indicators, risk assessment and selection of protective measures, based on attack graphs and thus allows us to consider the dynamics of changes in the components of the smart infrastructure. The automated system for assessing the security risks in the smart infrastructure and choosing the protective measures has been implemented.
引用
收藏
页码:295 / 300
页数:6
相关论文
共 19 条
  • [1] [Anonymous], WHITE PAPER 6 KEY RI
  • [2] [Anonymous], 2019, PENETRATION TESTING
  • [3] SOFTWARE RISK MANAGEMENT - PRINCIPLES AND PRACTICES
    BOEHM, BW
    [J]. IEEE SOFTWARE, 1991, 8 (01) : 32 - 41
  • [4] COBRA: A hybrid method for software cost estimation, benchmarking, and risk assessment
    Briand, LC
    El Emam, K
    Bomarius, F
    [J]. PROCEEDINGS OF THE 1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1998, : 390 - 399
  • [5] Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework
    Cuppens, F
    Autrel, F
    Bouzida, Y
    Garcia, J
    Gombault, S
    Sans, T
    [J]. ANNALS OF TELECOMMUNICATIONS, 2006, 61 (1-2) : 197 - 217
  • [6] An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
    Dakhnovich, A. D.
    Moskvin, D. A.
    Zegzhda, D. P.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 948 - 953
  • [7] CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection
    Doynikova, Elena
    Kotenko, Igor
    [J]. 2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 346 - 353
  • [8] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [9] Jufri M. T., 2018, P 2ND INT C INFORMAT
  • [10] Automated Reaction based on Risk Analysis and Attackers Skills in Intrusion Detection Systems
    Kanoun, Wael
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Araujo, Jose
    [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 117 - +