skip to main content
10.1145/1853919.1853926acmconferencesArticle/Chapter ViewAbstractPublication PagesesemConference Proceedingsconference-collections
research-article

Adversary-driven state-based system security evaluation

Published:15 September 2010Publication History

ABSTRACT

To provide insight on system security and aid decision-makers, we propose the ADversary VIew Security Evaluation (ADVISE) method to quantitatively evaluate the strength of a system's security. Our approach is to create an executable state-based security model of a system. The security model is initialized with information characterizing the system and the adversaries attacking the system. The model then simulates the attack behavior of the adversaries to produce a quantitative assessment of system security strength. This paper describes the system and adversary characterization data that are collected as input for the executable model. This paper also describes the simulation algorithms for adversary attack behavior and the computation for the probability that an attack attempt is successful. A simple case study illustrates how to analyze system security using the ADVISE method. A tool is currently under development to facilitate automatic model generation and simulation. The ADVISE method aggregates security-relevant information about a system and its adversaries to produce a quantitative security analysis useful for holistic system security decisions.

References

  1. }}D. Buckshaw, G. Parnell, W. Unkenholz, D. Parks, J. Wallner, and O. S. Saydjari. Mission oriented risk and design analysis of critical information systems. Military Operations Research, 10(2):19--38, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  2. }}M. Dacier and Y. Deswarte. Privilege graph: an extension to the typed access matrix model. In ESORICS '94: Proceedings of the Third European Symposium on Research in Computer Security, pages 319--334, London, UK, 1994. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}M. Dacier, Y. Deswarte, and M. Kaâniche. Models and tools for quantitative assessment of operational security. pages 177--186, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}S. Evans and J. Wallner. Risk based security engineering through the eyes of the adversary. In Proceedings of the 2005 IEEE Workshop on Information Assurance. United States Military Academy, West Point, NY, June 2005.Google ScholarGoogle ScholarCross RefCross Ref
  5. }}R. Ortalo, Y. Deswarte, and M. Kaâniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Softw. Eng., 25(5):633--650, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, page 273, Washington, DC, USA, 2002. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}O. M. Sheyner. Scenario graphs and attack graphs. PhD thesis, Pittsburgh, PA, USA, 2004. Chair-Wing, Jeannette. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}G. Stoneburner, A. Goguen, and A. Feringa. Risk Management Guide for Information Technology Systems (SP 800-30). National Institute of Standards and Technology, Gaithersburg, Maryland, July 2002.Google ScholarGoogle Scholar
  9. }}L. Wang, A. Singhal, and S. Jajodia. Toward measuring network security using attack graphs. In QoP '07: Proceedings of the 2007 ACM workshop on Quality of protection, pages 49--54, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}B. Whiteman. Network risk assessment tool (NRAT). IAnewsletter, 11(1):4--8, Spring 2008.Google ScholarGoogle Scholar

Index Terms

  1. Adversary-driven state-based system security evaluation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MetriSec '10: Proceedings of the 6th International Workshop on Security Measurements and Metrics
          September 2010
          78 pages
          ISBN:9781450303408
          DOI:10.1145/1853919

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 September 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader