Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification
نویسندگان
چکیده
Numerous security metrics have been proposed in the past for protecting computer networks. However we still lack effective techniques to accurately measure the predictive security risk of an enterprise taking into account the dynamic attributes associated with vulnerabilities that can change over time. In this paper we present a stochastic security framework for obtaining quantitative measures of security using attack graphs. Our model is novel as existing research in attack graph analysis do not consider the temporal aspects associated with the vulnerabilities, such as the availability of exploits and patches which can affect the overall network security based on how the vulnerabilities are interconnected and leveraged to compromise the system. Gaining a better understanding of the relationship between vulnerabilities and their lifecycle events can provide security practitioners a better understanding of their state of security. In order to have a more realistic representation of how the security state of the network would vary over time, a nonhomogeneous model is developed which incorporates a time dependent covariate, namely the vulnerability age. The daily transition-probability matrices are estimated using Frei's Vulnerability Lifecycle model. We also leverage the trusted CVSS metric domain to analyze how the total exploitability and impact measures evolve over a time period for a given network.
منابع مشابه
Cyber Security Analytics: A Stochastic Model for Security Quantification Using Absorbing Markov Chains
— Most of the current research in security analysis has been centered on identifying threats and vulnerabilities and providing suitable defense mechanisms to improve the robustness of the network and systems. While this approach is attractive, it provides limited insight into understanding the impact these attacks have on the overall security goals of the network and the system. Attack Graph a...
متن کاملEEVi –Framework and Guidelines to Evaluate the Effectiveness of Cyber- Security Visualization
Cyber-security visualization aims to reduce security analysts’ workload by presenting information as visual analytics instead of a string of text and characters. However, the adoption of the resultant visualizations by security analysts, is not widespread. The literature indicates a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a rea...
متن کاملVACS: Visual Analytics Suite for Cyber Security - Visual Exploration of Cyber Security Datasets
Visual exploration of cyber security datasets is an important and highly relevant field of research. To address the cyber security challenge of the VAST Challenge 2013, we utilized our novel Visual Analytics Suite for Cyber Security (VACS) to visually explore the given datasets using a combination of different visual representations. VACS primarily provides a dashboard view, host-based thumbnai...
متن کاملA Predictive Framework for Cyber Security Analytics using Attack Graphs
Security metrics serve as a powerful tool for organizations to understand the effectiveness of protecting computer networks. However majority of these measurement techniques don’t adequately help corporations to make informed risk management decisions. In this paper we present a stochastic security framework for obtaining quantitative measures of security by taking into account the dynamic attr...
متن کاملTowards an Operational Semantic Theory of Cyber Defense Against Advanced Persistent Threats
This paper presents current work on developing an operational semantic theory of cyber defense against advanced persistent threats (APTs), which is grounded in cyber threat analytics, science of evidence, knowledge engineering, and machine learning. After introducing advanced persistent threats, it overviews a systematic APT detection framework and the corresponding APT detection models, the fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1501.01901 شماره
صفحات -
تاریخ انتشار 2014