Automated security investment analysis of dynamic networks
Version 2 2024-06-13, 13:24Version 2 2024-06-13, 13:24
Version 1 2019-11-18, 11:56Version 1 2019-11-18, 11:56
conference contribution
posted on 2024-06-13, 13:24 authored by SY Enoch, JB Hong, M Ge, H Alzaid, DS Kim© 2018 Association for Computing Machinery. It is important to assess the cost benefits of IT security investments. Typically, this is done by manual risk assessment process. In this paper, we propose an approach to automate this using graphical security models (GSMs). GSMs have been used to assess the security of networked systems using various security metrics. Most of the existing GSMs assumed that networks are static, however, modern networks (e.g., Cloud and Software Defined Networking) are dynamic with changes. Thus, it is important to develop an approach that takes into account the dynamic aspects of networks. To this end, we automate security investments analysis of dynamic networks using a GSM named Temporal-Hierarchical Attack Representation Model (T-HARM) in order to automatically evaluate the security investments and their effectiveness for a given period of time. We demonstrate our approach via simulations.
History
Pagination
1-10Location
Brisbane, QueenslandPublisher DOI
Start date
2018-01-29End date
2018-02-02ISBN-13
9781450354363Language
engPublication classification
E1.1 Full written paper - refereedTitle of proceedings
ACSW 2018 : Proceedings of the Australasian Computer Science Week MulticonferenceEvent
Australasian Computer Science Week. Multiconference (2018 : Brisbane, Queensland)Publisher
ACMPlace of publication
New York, N.Y.Usage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC