TY - JOUR
T1 - A stochastic model for quantitative security analyses of networked systems
AU - Li, Xiaohu
AU - Parker, Paul
AU - Xu, Shouhuai
PY - 2011
Y1 - 2011
N2 - Traditional security analyses are often geared toward cryptographic primitives or protocols. Although such analyses are necessary, they cannot address a defender's need for insight into which aspects of a networked system having a significant impact on its security, and how to tune its configurations or parameters so as to improve security. This question is known to be notoriously difficult to answer, and the state of the art is that we know little about it. Toward ultimately addressing this question, this paper presents a stochastic model for quantifying security of networked systems. The resulting model captures two aspects of a networked system: 1) the strength of deployed security mechanisms such as intrusion detection systems and 2) the underlying vulnerability graph, which reflects how attacks may proceed. The resulting model brings the following insights: 1) How should a defender tune system configurations (e.g., network topology) so as to improve security? 2) How should a defender tune system parameters (e.g., by upgrading which security mechanisms) so as to improve security? 3) Under what conditions is the steady-state number of compromised entities of interest below a given threshold with a high probability? Simulation studies are conducted to confirm the analytic results, and to show the tightness of the bounds of certain important metric that cannot be resolved analytically.
AB - Traditional security analyses are often geared toward cryptographic primitives or protocols. Although such analyses are necessary, they cannot address a defender's need for insight into which aspects of a networked system having a significant impact on its security, and how to tune its configurations or parameters so as to improve security. This question is known to be notoriously difficult to answer, and the state of the art is that we know little about it. Toward ultimately addressing this question, this paper presents a stochastic model for quantifying security of networked systems. The resulting model captures two aspects of a networked system: 1) the strength of deployed security mechanisms such as intrusion detection systems and 2) the underlying vulnerability graph, which reflects how attacks may proceed. The resulting model brings the following insights: 1) How should a defender tune system configurations (e.g., network topology) so as to improve security? 2) How should a defender tune system parameters (e.g., by upgrading which security mechanisms) so as to improve security? 3) Under what conditions is the steady-state number of compromised entities of interest below a given threshold with a high probability? Simulation studies are conducted to confirm the analytic results, and to show the tightness of the bounds of certain important metric that cannot be resolved analytically.
KW - Security modeling
KW - networked systems
KW - quantitative security analysis
KW - security metric.
KW - vulnerability graph
UR - http://www.scopus.com/inward/record.url?scp=78649370617&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649370617&partnerID=8YFLogxK
U2 - 10.1109/TDSC.2008.75
DO - 10.1109/TDSC.2008.75
M3 - Article
AN - SCOPUS:78649370617
SN - 1545-5971
VL - 8
SP - 28
EP - 43
JO - IEEE Transactions on Dependable and Secure Computing
JF - IEEE Transactions on Dependable and Secure Computing
IS - 1
M1 - 4695835
ER -