Abstract
Security assessment of organization’s information systems is becoming increasingly complex due to their growing sizes and underlying architectures, e.g., cloud. Analyzing potential attacks is a pragmatic approach that provides insightful information to achieve this purpose. In this work, we propose to synthesize defense configurations to counter sophisticated attack strategies minimizing resource usage while ensuring a high probability of success. For this, we combine Statistical Model Checking techniques with Genetic Algorithms. Experiments performed on real-life case studies show substantial improvements compared to existing techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This reflects a realistic behavior expressing the monotony of an attack.
- 2.
In this work, we restrict to static strategies, i.e., the same in any state. Considering dynamic strategies is a future work.
- 3.
Further details are provided in Appendix A.
- 4.
Except for the first three cases in BGP where the probability of success is 0.
References
Baker, G.H., Berg, A.: Supervisory control and data acquisition (SCADA) systems. Crit. Infrastruct. Prot. Rep. 1(6), 5–6 (2002)
Butts, J.W., Mills, R.F., Baldwin, R.O.: Developing an insider threat model using functional decomposition. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 412–417. Springer, Heidelberg (2005). https://doi.org/10.1007/11560326_32
Convery, S., Cook, D., Franz, M.: An Attack Tree for the Border Gateway Protocol. Cisco Internet Draft (2002)
Edge, K.S., Dalton, G.C., Raines, R.A., Mills, R.F.: Using attack and protection trees to analyze threats and defenses to homeland security. In: Military Communications Conference, MILCOM 2006, pp. 1–7. IEEE (2006)
Gadyatskaya, O., Hansen, R.R., Larsen, K.G., Legay, A., Olesen, M.C., Poulsen, D.B.: Modelling attack-defense trees using timed automata. In: Fränzle, M., Markey, N. (eds.) FORMATS 2016. LNCS, vol. 9884, pp. 35–50. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44878-7_3
Hérault, T., Lassaigne, R., Magniette, F., Peyronnet, S.: Approximate probabilistic model checking. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 73–84. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24622-0_8
Sans ICS: Analysis of the cyber attack on the Ukrainian power grid (2016). Accessed 25 Apr 2018
Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack–defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80–95. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19751-2_6
Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2005). https://doi.org/10.1007/11734727_17
Mediouni, B.L., Niar, S., Benmansour, R., Benatchba, K., Koudil, M.: A bi-objective heuristic for heterogeneous MPSoC design space exploration. In: 2015 10th International Design & Test Symposium (IDT), pp. 90–95. IEEE (2015)
Roy, A., Kim, D.S., Trivedi, K.S.: Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Secur. Commun. Netw. 5(8), 929–943 (2012)
Wang, P., Lin, W.-H., Kuo, P.-T., Lin, H.-T., Wang, T.C.: Threat risk analysis for cloud security based on attack-defense trees. In: ICCM, pp. 106–111 (2012)
Younes, H.L.S.: Verification and planning for stochastic processes with asynchronous events. Ph.D. thesis, Carnegie Mellon (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
AÂ Case Studies Description
AÂ Case Studies Description
In the following case study descriptions, attack actions are characterized by their lower (LB) and upper (UB) time bounds, the required resources (Cost) and their probability to succeed (Env). In the ADTs, attack actions are represented by ellipses and defense actions by rectangles.
1.1 A.1Â An Organization System Attack (ORGA) [5]
See (Fig. 6).
1.2 A.2Â Resetting a BGP Session (BGP) [3]
We constructed this case study based on [11], in which detection and mitigation events are attached with success probabilities (resp. \(P_D\) and \(P_M\)). We transpose these probabilities to the attack actions in a straightforward manner: the probability of an attack action to succeed is computed as the probability that all the implemented countermeasures set to block it, fail. For example, the attack action sa can be blocked by both defense actions au and rn. So, the probability of sa to succeed equals \(Env(sa) = (1-P_{D1}\times P_{M1})\times (1-P_{D2}\times P_{M2})\), where \(P_{D1}\), \(P_{D2}\), \(P_{M1}\) and \(P_{M2}\) are given in [11]. Note that, in our case, a pair of detection-mitigation events is combined is a single defense action. For example, \(P_{D1}\) and \(P_{M1}\) are merged into a defense au, and, \(P_{D2}\) and \(P_{M2}\) into the defense action rn. Also, the defense mechanisms are fixed before starting an analysis and have a probability 1 (Fig. 7).
1.3 A.3Â Supervisory Control and Data Acquisition System (SCADA)Â [1]
Similarly to BGP, SCADA is inspired from [11]. This case study represents an example of how attack trees are used to answer the failure assessment problem where attack actions represent the possible hardware/software failures. Since we are interested to identify what an attacker can do to reach a malicious goal on a system, we then interpret these attack actions as an attacker trying to trigger a hardware/software failure. So, in addition to the transposition from probabilities of successful defenses to probabilities of successful attack actions, Env also scales with the probability of failures. For example, the probability of g1 to succeed, provided it is guarded by a defense rst1, is computed as: \(Env(g1) = P_{g1} \times (1- P_D \times P_M)\), where the probabilities of a failure of the controlling agent one \(P_{g1}\), the detection of its failure \(P_D\) and its restarting \(P_M\) are given in [11].
In Fig. 8a, the operator “2/3” is a shortcut designating the case where at least two events \(s_i\) and \(s_j\) occur, with \(i\ne j\). It is equivalent to the boolean expression \(\phi = (s1 \wedge s2)\vee (s1 \wedge s3)\vee (s2 \wedge s3)\).
1.4 A.4Â A Malicious Insider Attack (MI) [2]
In what follows, we describe a Malicious Insider attack (MI). It is presented in [11] and is adapted to our context in a similar way to BGP (Fig. 9).
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Mediouni, B.L., Nouri, A., Bozga, M., Legay, A., Bensalem, S. (2018). Mitigating Security Risks Through Attack Strategies Exploration. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Verification. ISoLA 2018. Lecture Notes in Computer Science(), vol 11245. Springer, Cham. https://doi.org/10.1007/978-3-030-03421-4_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-03421-4_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03420-7
Online ISBN: 978-3-030-03421-4
eBook Packages: Computer ScienceComputer Science (R0)