Deakin University
Browse

Automated security investment analysis of dynamic networks

Version 2 2024-06-13, 13:24
Version 1 2019-11-18, 11:56
conference contribution
posted on 2024-06-13, 13:24 authored by SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim
© 2018 Association for Computing Machinery. It is important to assess the cost benefits of IT security investments. Typically, this is done by manual risk assessment process. In this paper, we propose an approach to automate this using graphical security models (GSMs). GSMs have been used to assess the security of networked systems using various security metrics. Most of the existing GSMs assumed that networks are static, however, modern networks (e.g., Cloud and Software Defined Networking) are dynamic with changes. Thus, it is important to develop an approach that takes into account the dynamic aspects of networks. To this end, we automate security investments analysis of dynamic networks using a GSM named Temporal-Hierarchical Attack Representation Model (T-HARM) in order to automatically evaluate the security investments and their effectiveness for a given period of time. We demonstrate our approach via simulations.

History

Pagination

1-10

Location

Brisbane, Queensland

Start date

2018-01-29

End date

2018-02-02

ISBN-13

9781450354363

Language

eng

Publication classification

E1.1 Full written paper - refereed

Title of proceedings

ACSW 2018 : Proceedings of the Australasian Computer Science Week Multiconference

Event

Australasian Computer Science Week. Multiconference (2018 : Brisbane, Queensland)

Publisher

ACM

Place of publication

New York, N.Y.

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC