Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems?

نویسنده

  • Stephen Neville
چکیده

As network speeds and complexities increase, the development of automated systems that enact optimal tactical responses will be required. INFOSEC (information security) alert correlation systems provide a natural home for such capabilities. It can be asked whether the current generation of these systems has the technical capabilities required to enact optimal tactical responses. Specifically, is there a requirement to incorporate deeper levels of risk analysis within correlation systems? Currently, correlation systems only model attack risk via the generic attack severity metrics. Hence, these systems implicitly assume that: (a) all attacks are uniquely identifiable, or (b) the risk associated with the attacks is uniformly distributed across the set of plausible attacks. This work provides formal support for the intuitive supposition that such assumptions may not be supportable in the real-world and, hence, that integrated risk modeling is likely a necessity if optimal tactical attack response sub-systems are to be added.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mission-Impact-Based Approach to INFOSEC Alarm Correlation

We describe a mission-impact-based approach to the analysis of security alerts produced by spatially distributed heterogeneous information security (INFOSEC) devices, such as firewalls, intrusion detection systems, authentication services, and antivirus software. The intent of this work is to deliver an automated capability to reduce the time and cost of managing multiple INFOSEC devices throug...

متن کامل

Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives

Effective information security (InfoSec) management cannot be achieved through only technology; people are the weakest point in security and their behaviors such as inappropriate use of computer and network resources, file sharing habits etc. cannot be controlled by security technologies. Although the importance of individuals’ InfoSec behaviors has been widely recognized, there is limited unde...

متن کامل

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

Tactical and operational planning for socially responsible fresh agricultural supply chain

Addressing an integrated decision-making structure for planting and harvesting scheduling may lead to more realistic, accurate, and efficient decision in fresh product supply chain. This study aims to develop an integrated bi-objective tactical and operational planning model for producing and distributing fresh crops. The first objective of the model is to maximize total revenue of supply chain...

متن کامل

Statistical Causality Analysis of INFOSEC Alert Data

With the increasingly widespread deployment of security mechanisms, such as firewalls, intrusion detection systems (IDSs), antivirus software and authentication services, the problem of alert analysis has become very important. The large amount of alerts can overwhelm security administrators and prevent them from adequately understanding and analyzing the security state of the network, and init...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005