Deakin University
Browse

File(s) under permanent embargo

Automated security investment analysis of dynamic networks

conference contribution
posted on 2018-01-01, 00:00 authored by S Y Enoch, J B Hong, Mengmeng Ge, H Alzaid, D S Kim
© 2018 Association for Computing Machinery. It is important to assess the cost benefits of IT security investments. Typically, this is done by manual risk assessment process. In this paper, we propose an approach to automate this using graphical security models (GSMs). GSMs have been used to assess the security of networked systems using various security metrics. Most of the existing GSMs assumed that networks are static, however, modern networks (e.g., Cloud and Software Defined Networking) are dynamic with changes. Thus, it is important to develop an approach that takes into account the dynamic aspects of networks. To this end, we automate security investments analysis of dynamic networks using a GSM named Temporal-Hierarchical Attack Representation Model (T-HARM) in order to automatically evaluate the security investments and their effectiveness for a given period of time. We demonstrate our approach via simulations.

History

Event

Australasian Computer Science Week. Multiconference (2018 : Brisbane, Queensland)

Pagination

1 - 10

Publisher

ACM

Location

Brisbane, Queensland

Place of publication

New York, N.Y.

Start date

2018-01-29

End date

2018-02-02

ISBN-13

9781450354363

Language

eng

Publication classification

E1.1 Full written paper - refereed

Title of proceedings

ACSW 2018 : Proceedings of the Australasian Computer Science Week Multiconference

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports