Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics
نویسندگان
چکیده
Lexington Massachusetts This page intentionally left blank. EXECUTIVE SUMMARY The goal of this work is to introduce meaningful security metrics that motivate eective improvements in network security. We present a methodology for directly deriving security metrics from realistic mathematical models of adversarial behaviors and systems and also a maturity model to guide the adoption and use of these metrics. Four security metrics are described that assess the risk from prevalent network threats. These can be computed automatically and continuously on a network to assess the eectiveness of controls. Each new metric directly assesses the eect of controls that mitigate vulnerabilities, continuously estimates the risk from one adversary, and provides direct insight into what changes must be made to improve security. Details of an explicit maturity model are provided for each metric that guide security practitioners through three stages where they (1) Develop foundational understanding, tools and procedures, (2) Make accurate and timely measurements that cover all relevant network components and specify security conditions to test, and (3) Perform continuous risk assessments and network improvements. Metrics are designed to address specic threats, maintain practicality and simplicity, and motivate risk reduction. These initial four metrics and additional ones we are developing should be added incrementally to a network to gradually improve overall security as scores drop to acceptable levels and the risks from associated cyber threats are mitigated. iii This page intentionally left blank. ACKNOWLEDGMENT We would like to thank George Moore from the Department of State for his consistently insightful and cogent remarks. v This page intentionally left blank.
منابع مشابه
A Survey on Security Metrics
The importance of security metrics can hardly be overstated. Despite the attention that has been paid by the academia, government and industry in the past decades, this important problem stubbornly remains open. In this survey, we present a survey of knowledge on security metrics. The survey is centered on a novel taxonomy, which classifies security metrics into four categories: metrics for mea...
متن کاملAssessment of the Conservation Area Network Development in Markazi Province Using Landscape Metrics
Prioritization and selection of sample areas from the whole nature is necessary to protect biodiversity. The main purpose of this study was to evaluate the development of a network of conservation areas in Markazi province using landscape metrics. For this purpose, we used MaxEnt, Marxan, Fragstat softwares and eight conservation criteria. Results were compared by using simulated sorting, greed...
متن کاملComposition operators and natural metrics in meromorphic function classes $Q_p$
In this paper, we investigate some results on natural metrics on the $mu$-normal functions and meromorphic $Q_p$-classes. Also, these classes are shown to be complete metric spaces with respect to the corresponding metrics. Moreover, compact composition operators $C_phi$ and Lipschitz continuous operators acting from $mu$-normal functions to the meromorphic $Q_p$-classes are characte...
متن کاملSecurity Metrics Model for Web Page Vulnerability Classification and Ranking
Metrology, the science of measurement, is very important in the development of science and engineering principles if any meaningful progress will be made in these fields. This concept also applies to computer security if decision makers are to rely on judgment based on metrics. Management needs to establish how secured their organizations are, the amount of resources to allocate to various comp...
متن کاملCyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains
— Most of the current research in security analysis has been centered on identifying threats and vulnerabilities and providing suitable defense mechanisms to improve the robustness of the network and systems. While this approach is attractive, it provides limited insight into understanding the impact these attacks have on the overall security goals of the network and the system. Attack Graph a...
متن کامل