A Holistic Approach to Evaluating Cyber Security Defensive Capabilities

01/31/2019
by   Michael D. Iannacone, et al.
0

Metrics and frameworks to quantifiably assess security measures have arisen from needs of three distinct research communities - statistical measures from the intrusion detection and prevention literature, evaluation of cyber exercises, e.g., red-team and capture-the-flag competitions, and economic analyses addressing cost-versus-security tradeoffs. In this paper we provide two primary contributions to the security evaluation literature - a representative survey, and a novel framework for evaluating security that is flexible, applicable to all three use cases, and readily interpretable. In our survey of the literature we identify the distinct themes from each community's evaluation procedures side by side and flesh out the drawbacks and benefits of each. Next, we provide a framework for evaluating security by comprehensively modeling the resource, labor, and attack costs in dollars incurred based on quantities, accuracy metrics, and time. This framework is a more "holistic" approach in that it incorporates the accuracy and performance metrics, which dominate intrusion detection evaluation, the time to detection and impact to data and resources of an attack, favored by educational competitions' metrics, and the monetary cost of many essential security components used in financial analysis. Moreover, it is flexible enough to accommodate each use case, easily interpretable, and comprehensive in terms of costs considered. Finally, we provide two examples of the framework applied to real-world use cases. Overall, we provide a survey and a grounded, flexible framework and multiple concrete examples for evaluating security that addresses the needs of three, currently distinct communities.

READ FULL TEXT
research
12/15/2018

A short review on Applications of Deep learning for Cyber security

Deep learning is an advanced model of traditional machine learning. This...
research
01/29/2020

Intrusion Detection Systems: A Cross-Domain Overview

The cybersecurity ecosystem continuously changes with the growth of cybe...
research
01/27/2020

Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

The identification of cyberattacks which target information and communic...
research
04/22/2021

Research Communities in cyber security: A Comprehensive Literature Review

In order to provide a coherent overview of cyber security research, the ...
research
11/03/2019

SOK: A Comprehensive Reexamination of Phishing Research from the Security Perspective

Phishing and spear-phishing are typical examples of masquerade attacks s...
research
02/24/2020

Cry Wolf: Toward an Experimentation Platform and Dataset for Human Factors in Cyber Security Analysis

Computer network defense is a partnership between automated systems and ...

Please sign up or login with your details

Forgot password? Click here to reset