skip to main content
10.1145/1456362.1456368acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Measuring network security using dynamic bayesian network

Published:27 October 2008Publication History

ABSTRACT

Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics have generally focused on measuring individual vulnerabilities without considering their combined effects. Our previous work tackle this issue by exploring the causal relationships between vulnerabilities encoded in an attack graph. However, the evolving nature of vulnerabilities and networks has largely been ignored. In this paper, we propose a Dynamic Bayesian Networks (DBNs)-based model to incorporate temporal factors, such as the availability of exploit codes or patches. Starting from the model, we study two concrete cases to demonstrate the potential applications. This novel model provides a theoretical foundation and a practical framework for continuously measuring network security in a dynamic environment.

References

  1. P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. X. An, D. Jutla, and N. Cercone. Privacy intrusion detection using dynamic bayesian networks. In Proceedings of the 8th International Conference for Electronic Commerce (ICEC'06), pages 208--215, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. Asnar, P. Giorgini, F. Massacci, and N. Zannone. From trust to dependability through risk analysis. In Proceedings of ARES'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Applied Computer Security Associates. Workshop on. In Information Security System Scoring and Ranking, 2001.Google ScholarGoogle Scholar
  5. P. Balzarotti, M. Monga, and S. Sicari. Assessing the risk of using vulnerable components. In Proceedings of the 2nd ACM workshop on Quality of protection, 2005.Google ScholarGoogle Scholar
  6. T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In Proceedings of the Third European Symposium on Research in Computer Security (ESORICS'94), pages 3--18, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Common vulnerability scoring system - SIG. available at: http://www.first.org/cvss/, Accessed May 2008.Google ScholarGoogle Scholar
  8. M. Frigault and L. Wang. Measuring network security using bayesian network-based attack graphs. In Proceedings of the 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA'08), 2008.Google ScholarGoogle ScholarCross RefCross Ref
  9. Klaus Havelund and Grigore Roşu. Efficient monitoring of safety properties. Int. J. Softw. Tools Technol. Transf., 6(2):158--173, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  10. K. S. Hoo. Metrics of network security. White Paper, 2004.Google ScholarGoogle Scholar
  11. S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, 2003.Google ScholarGoogle Scholar
  12. A. Jaquith. Security Metrics Replacing Fear, Uncertainty, and Doubt. AddisonWesley, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. Liu and H. Man. Network vulnerability assessment using bayesian networks. In Proceedings of SPIE - Data Mining, Intrusion Detection, Information Assurance and Data Networks Security (SPIE'05), pages 61--71, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  14. K. Manadhata, J. M. Wing, M. A. Flynn, and M. A. McQueen. Measuring the attack surfaces of two ftp daemons. In Quality of Protection Workshop, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. John McHugh. Quality of protection: Measuring the unmeasurable? In Proceedings of QoP (QoP'06), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. V. Mihajlovic and M Petkovic. Dynamic bayesian networks: A state of the art. available at: http://doc.utwente.nl/36632/1/0000006a.pdf.Google ScholarGoogle Scholar
  17. National Institute of Standards and Technology. Technology assessment: Methods for measuring the level of computer security. NIST Special Publication 500--133, 1985.Google ScholarGoogle Scholar
  18. National vulnerability database. available at: http://www.nvd.org, May 9, 2008.Google ScholarGoogle Scholar
  19. J. Pamula, S. Jajodia, P. Ammann, and V. Swarup. A weakest-adversary security metric for network configuration security analysis. In Proceedings of the 2nd ACM workshop on Quality of protection, pages 31--38, New York, NY, USA, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M .K. Reiter and S. G. Stubblebine. Authentication metric analysis and design. ACM Transactions on Information and System Security, 2(2):138--158, 5 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Ritchey and P. Ammann. Using model checking to analyze network vulnerabilities. In Proceedings of the 2000 IEEE Symposium on Research on Security and Privacy (S&P'00), pages 156--165, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P'02), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Swanson, N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. NIST Special Publication 800--55, 2003.Google ScholarGoogle Scholar
  24. L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia. An attack graph-based probabilistic security metric. In Proceedings of The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'08), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L. Wang, S. Noel, and S. Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications, 29(18):3812--3824, 11 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. Wang, A. Singhal, and S. Jajodia. Measuring network security using attack graphs. In Proceedings of the 3rd ACM workshop on Quality of protection (QoP'07), New York, NY, USA, 2007. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. L. Wang, A. Singhal, and S. Jajodia. Measuring the overall security of network configurations using attack graphs. In Proceedings of 21th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'07), 2007.Google ScholarGoogle ScholarCross RefCross Ref
  28. L. Wang, C. Yao, A. Singhal, and S. Jajodia. Interactive analysis of attack graphs using relational queries. In Proceedings of 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'06), pages 119--132, 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Measuring network security using dynamic bayesian network

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          QoP '08: Proceedings of the 4th ACM workshop on Quality of protection
          October 2008
          84 pages
          ISBN:9781605583211
          DOI:10.1145/1456362

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 27 October 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader