Optimal security hardening on attack tree models of networks: a cost-benefit analysis
International Journal of Information Security, 2012•Springer
Researchers have previously looked into the problem of determining whether a given set of
security hardening measures can effectively make a networked system secure. However,
system administrators are often faced with a more challenging problem since they have to
work within a fixed budget which may be less than the minimum cost of system hardening.
An attacker, on the other hand, explores alternative attack scenarios to inflict the maximum
damage possible when the security controls are in place, very often rendering the optimality …
security hardening measures can effectively make a networked system secure. However,
system administrators are often faced with a more challenging problem since they have to
work within a fixed budget which may be less than the minimum cost of system hardening.
An attacker, on the other hand, explores alternative attack scenarios to inflict the maximum
damage possible when the security controls are in place, very often rendering the optimality …
Abstract
Researchers have previously looked into the problem of determining whether a given set of security hardening measures can effectively make a networked system secure. However, system administrators are often faced with a more challenging problem since they have to work within a fixed budget which may be less than the minimum cost of system hardening. An attacker, on the other hand, explores alternative attack scenarios to inflict the maximum damage possible when the security controls are in place, very often rendering the optimality of the controls invalid. In this work, we develop a systematic approach to perform a cost-benefit analysis on the problem of optimal security hardening under such conditions. Using evolutionary paradigms such as multi-objective optimization and competitive co-evolution, we model the attacker-defender interaction as an “arms race”, and explore how security controls can be placed in a network to induce a maximum return on investment.
Springer