Skip to main content
Erschienen in: Annals of Telecommunications 1-2/2018

27.12.2017

Assessing the risk of complex ICT systems

verfasst von: Nizar Kheir, A. Ridha Mahjoub, M. Yassine Naghmouchi, Nancy Perrot, Jean-Philippe Wary

Erschienen in: Annals of Telecommunications | Ausgabe 1-2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

ICT systems are becoming increasingly complex and dynamic. They mostly include a large number of heterogeneous and interconnected assets (both physically and logically), which may be in turn exposed to multiple security flaws and vulnerabilities. Moreover, dynamicity is becoming paramount in modern ICT systems, since new assets and device configurations may be constantly added, updated, and removed from the system, leading to new security flaws that were not even existing at design time. From a risk assessment perspective, this adds new challenges to the defenders, as they are required to maintain risks within an acceptable range, while the system itself may be constantly evolving, sometimes in an unpredictable way. This paper introduces a new risk assessment framework that is aimed to address these specific challenges and that advances the state of the art along two distinct directions. First, we introduce the risk assessment graphs (RAGs), which provide a model and formalism that enable to characterize the system and its encountered risks. Nodes in the RAG represent each asset and its associated vulnerability, while edges represent the risk propagation between two adjacent nodes. Risk propagations in the graph are determined through two different metrics, namely the accessibility and potentiality, both formulated as a function of time and respectively capture the topology of the system and its risk exposure, as well as the way they evolve over time. Second, we introduce a quantitative risk assessment approach that leverages the RAGs in order to compute all possible attack paths in the system and to further infer their induced risks. Our approach achieves both flexibility and generality requirements and applies to a wide set of applications. In this paper, we demonstrate its usage in the context of a software-defined networking (SDN) testbed, and we conduct multiple experiments to evaluate the efficiency and scalability of our solution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Purdy G (2010) ISO 31000: 2009—setting a new standard for risk management. Risk Anal 30(6):881–886CrossRef Purdy G (2010) ISO 31000: 2009—setting a new standard for risk management. Risk Anal 30(6):881–886CrossRef
3.
Zurück zum Zitat Alberts C J, Behrens S G, Pethia R D, Wilson W R (1999) Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework. Version 1.0 Alberts C J, Behrens S G, Pethia R D, Wilson W R (1999) Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework. Version 1.0
4.
Zurück zum Zitat Mell P, Scarfone K, Romanosky S (2007) A complete guide to the common vulnerability scoring system version 2.0. Published by FIRST-forum of incident response and security teams, 1–23 Mell P, Scarfone K, Romanosky S (2007) A complete guide to the common vulnerability scoring system version 2.0. Published by FIRST-forum of incident response and security teams, 1–23
5.
Zurück zum Zitat Sheyner OM (2004) Scenario graphs and attack graphs (Doctoral dissertation, US Air Force Research Laboratory) Sheyner OM (2004) Scenario graphs and attack graphs (Doctoral dissertation, US Air Force Research Laboratory)
6.
Zurück zum Zitat Bondy J A, Murty U S R (1976) Graph theory with applications, vol 290. London: Macmillan Bondy J A, Murty U S R (1976) Graph theory with applications, vol 290. London: Macmillan
7.
Zurück zum Zitat West DB (2001) Introduction to graph theory, vol 2. Upper Saddle River: Prentice hall West DB (2001) Introduction to graph theory, vol 2. Upper Saddle River: Prentice hall
9.
Zurück zum Zitat Phillips C, Swiler L P (1998) A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 workshop on new security paradigms, pp 71–79 Phillips C, Swiler L P (1998) A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 workshop on new security paradigms, pp 71–79
10.
Zurück zum Zitat Ou X, Boyer W F, McQueen M A (2006) A scalable approach to attack graph generation. In: Proceedings of the 13th ACM con- ference on computer and communications security, pp 336–345 Ou X, Boyer W F, McQueen M A (2006) A scalable approach to attack graph generation. In: Proceedings of the 13th ACM con- ference on computer and communications security, pp 336–345
11.
Zurück zum Zitat Ammann P, Wijesekera D, Kaushik S (2002) Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM conference on computer and communications security, pp 217–224 Ammann P, Wijesekera D, Kaushik S (2002) Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM conference on computer and communications security, pp 217–224
12.
Zurück zum Zitat Huang H, Zhang S, Ou X, Prakash A, Sakallah K (2011) Distilling critical attack graph surface iteratively through minimum-cost sat solving. In: Proceedings of the 27th annual computer security applications conference, pp 31–40 Huang H, Zhang S, Ou X, Prakash A, Sakallah K (2011) Distilling critical attack graph surface iteratively through minimum-cost sat solving. In: Proceedings of the 27th annual computer security applications conference, pp 31–40
13.
Zurück zum Zitat Viduto V, Huang W, Maple C (2011) Toward optimal multi-objective models of network security: survey. In: Automation and computing, ICAC, pp 6–11 Viduto V, Huang W, Maple C (2011) Toward optimal multi-objective models of network security: survey. In: Automation and computing, ICAC, pp 6–11
14.
Zurück zum Zitat Xie P, Li J H, Ou X, Liu P, Levy R (2010) Using Bayesian networks for cyber security analysis. In: IEEE/IFIP international con- ference on dependable systems and networks, 2010, pp 211–220 Xie P, Li J H, Ou X, Liu P, Levy R (2010) Using Bayesian networks for cyber security analysis. In: IEEE/IFIP international con- ference on dependable systems and networks, 2010, pp 211–220
15.
Zurück zum Zitat Mehta V, Bartzis C, Zhu H, Clarke E, Wing J (2006) Ranking attack graphs. In: Recent advances in intrusion detection, pp 127–144 Mehta V, Bartzis C, Zhu H, Clarke E, Wing J (2006) Ranking attack graphs. In: Recent advances in intrusion detection, pp 127–144
16.
Zurück zum Zitat Kijsanayothin P, Hewett R (2010) Analytical approach to attack graph analysis for network security. In: ARES’10 international conference on availability, reliability, and security, pp 25–32 Kijsanayothin P, Hewett R (2010) Analytical approach to attack graph analysis for network security. In: ARES’10 international conference on availability, reliability, and security, pp 25–32
17.
Zurück zum Zitat Wing J M et al. (2008) Scenario graphs applied to network security. In: Information assurance: survivability and security in networked systems, pp 247–277 Wing J M et al. (2008) Scenario graphs applied to network security. In: Information assurance: survivability and security in networked systems, pp 247–277
18.
Zurück zum Zitat Homer J, Zhang S, Ou X, Schmidt D, Du Y, Rajagopalan S R, Singhal A (2013) Aggregating vulnerability metrics in enterprise networks using attack graphs. J Comput Secur 21(4):561–597CrossRef Homer J, Zhang S, Ou X, Schmidt D, Du Y, Rajagopalan S R, Singhal A (2013) Aggregating vulnerability metrics in enterprise networks using attack graphs. J Comput Secur 21(4):561–597CrossRef
19.
Zurück zum Zitat Lippmann R P, Ingols KW (2005) An annotated review of past papers on attack graphs (No. PR-IA-1). Massachusetts Inst Of Tech Lexington Lincoln Lab Lippmann R P, Ingols KW (2005) An annotated review of past papers on attack graphs (No. PR-IA-1). Massachusetts Inst Of Tech Lexington Lincoln Lab
20.
Zurück zum Zitat Hong J, Kim D -S (2012) HARMs: hierarchical attack representation models for network security analysis. Security Research Institute, Edith Cowan University, Perth, Western Australia Hong J, Kim D -S (2012) HARMs: hierarchical attack representation models for network security analysis. Security Research Institute, Edith Cowan University, Perth, Western Australia
21.
Zurück zum Zitat Wang S, Zhang Z, Kadobayashi Y (2013) Exploring attack graph for cost-benefit security hardening: a probabilistic approach. Comput Secur 32:158–169CrossRef Wang S, Zhang Z, Kadobayashi Y (2013) Exploring attack graph for cost-benefit security hardening: a probabilistic approach. Comput Secur 32:158–169CrossRef
22.
Zurück zum Zitat Samarji L, Cuppens F, Cuppens-Boulahia N, Kanoun W, Dubus S (2013) Situation calculus and graph based defensive modeling of simultaneous attacks. In: Cyberspace safety and security, pp 132–150 Samarji L, Cuppens F, Cuppens-Boulahia N, Kanoun W, Dubus S (2013) Situation calculus and graph based defensive modeling of simultaneous attacks. In: Cyberspace safety and security, pp 132–150
24.
Zurück zum Zitat Van Benthem J (2011) Logical dynamics of information and interaction. Cambridge University Press Van Benthem J (2011) Logical dynamics of information and interaction. Cambridge University Press
25.
Zurück zum Zitat Noel S, Jajodia S, O’Berry B, Jacobs M (2003) Efficient minimum-cost network hardening via exploit dependency graphs. In: 19th annual computer security applications conference pro- ceedings, pp 86–95 Noel S, Jajodia S, O’Berry B, Jacobs M (2003) Efficient minimum-cost network hardening via exploit dependency graphs. In: 19th annual computer security applications conference pro- ceedings, pp 86–95
26.
Zurück zum Zitat Jakobson G (2011) Mission cyber security situation assessment using impact dependency graphs. In: Proceedings of the 14th international conference on information fusion (FUSION), pp 1–8 Jakobson G (2011) Mission cyber security situation assessment using impact dependency graphs. In: Proceedings of the 14th international conference on information fusion (FUSION), pp 1–8
27.
Zurück zum Zitat Kheir N, Cuppens-Boulahia N, Cuppens F, Debar H (2010) A service dependency model for cost-sensitive intrusion response. In: Computer security–ESORICS, pp 626–642 Kheir N, Cuppens-Boulahia N, Cuppens F, Debar H (2010) A service dependency model for cost-sensitive intrusion response. In: Computer security–ESORICS, pp 626–642
28.
Zurück zum Zitat Shandilya V, Simmons C B, Shiva S (2014) Use of attack graphs in security systems. Journal of Computer Networks and Communications, 2014 Shandilya V, Simmons C B, Shiva S (2014) Use of attack graphs in security systems. Journal of Computer Networks and Communications, 2014
29.
Zurück zum Zitat Yassine N M, Nancy P, Nizar K, Mahjoub A R, Wary J P (2016) A new risk assessment framework using graph theory for complex ICT systems. In: Proceedings of the 2016 international workshop on managing insider security threats. ACM, pp 97– 100 Yassine N M, Nancy P, Nizar K, Mahjoub A R, Wary J P (2016) A new risk assessment framework using graph theory for complex ICT systems. In: Proceedings of the 2016 international workshop on managing insider security threats. ACM, pp 97– 100
30.
Zurück zum Zitat Baras J S, Theodorakopoulos G (2010) Path problems in networks. Synthesis Lectures on Communication Networks 3(1):1–77CrossRefMATH Baras J S, Theodorakopoulos G (2010) Path problems in networks. Synthesis Lectures on Communication Networks 3(1):1–77CrossRefMATH
31.
32.
Zurück zum Zitat Ahmad I, Namal S, Ylianttila M et al. (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutorials 17(4):2317–2346CrossRef Ahmad I, Namal S, Ylianttila M et al. (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutorials 17(4):2317–2346CrossRef
35.
Zurück zum Zitat Erdös P, Rényi A (1959) On random graphs, I. Publicationes Mathematicae (Debrecen) 6:290–297MathSciNetMATH Erdös P, Rényi A (1959) On random graphs, I. Publicationes Mathematicae (Debrecen) 6:290–297MathSciNetMATH
36.
Zurück zum Zitat Ben-Tal A, El Ghaoui L, Nemirovski A (2009) Robust optimization. Princeton University Press Ben-Tal A, El Ghaoui L, Nemirovski A (2009) Robust optimization. Princeton University Press
37.
Zurück zum Zitat Schrijver A (2002) Combinatorial optimization: polyhedra and efficiency, vol 24. Springer Science & Business Media Schrijver A (2002) Combinatorial optimization: polyhedra and efficiency, vol 24. Springer Science & Business Media
38.
Zurück zum Zitat Dantzig GB (1998) Linear programming and extensions. Princeton University Press Dantzig GB (1998) Linear programming and extensions. Princeton University Press
40.
Zurück zum Zitat Mahjoub A R, Naghmouchi M Y, Perrot N (2017) A bi-level programming model for proactive countermeasure selection in complex ICT systems, INOC. Lisbonne, Portugal Mahjoub A R, Naghmouchi M Y, Perrot N (2017) A bi-level programming model for proactive countermeasure selection in complex ICT systems, INOC. Lisbonne, Portugal
Metadaten
Titel
Assessing the risk of complex ICT systems
verfasst von
Nizar Kheir
A. Ridha Mahjoub
M. Yassine Naghmouchi
Nancy Perrot
Jean-Philippe Wary
Publikationsdatum
27.12.2017
Verlag
Springer International Publishing
Erschienen in
Annals of Telecommunications / Ausgabe 1-2/2018
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-017-0617-0

Weitere Artikel der Ausgabe 1-2/2018

Annals of Telecommunications 1-2/2018 Zur Ausgabe