Efficient attack countermeasure selection accounting for recovery and action costs

04/05/2019
by   Jukka Soikkeli, et al.
0

The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending against such attacks can also be costly. This work proposes an attack countermeasure selection approach based on cost impact analysis that takes into account the impacts of actions by both the attacker and the defender. We consider a networked system providing services whose provision depends on other components in the network. We model the costs and losses to service availability from compromises and defensive actions to the components, and show that while containment of the attack can be an effective defensive strategy, it can be more cost-efficient to allow parts of the attack to continue further whilst focusing on recovering services to a functional state. Based on this insight, we build a countermeasure selection method that chooses the most cost-effective action based on its impact on expected losses and costs over a given time horizon. Our method is evaluated using simulations in synthetic graphs representing network dependencies and vulnerabilities, and found to perform well in comparison to alternatives.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/09/2010

Building Computer Network Attacks

In this work we start walking the path to a new perspective for viewing ...
research
02/08/2022

Ontology-based Attack Graph Enrichment

Attack graphs provide a representation of possible actions that adversar...
research
06/24/2019

Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

An attack graph is a method used to enumerate the possible paths that an...
research
05/02/2018

Analysing The Impact Of A DDoS Attack Announcement On Victim Stock Prices

DDoS attacks are increasingly used by `hackers' and `hacktivists' for va...
research
09/16/2019

DDoS Hide Seek: On the Effectiveness of a Booter Services Takedown

Booter services continue to provide popular DDoS-as-a-service platforms ...
research
05/20/2022

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web

The ubiquity of user accounts in websites and online services makes acco...
research
01/25/2021

The Role of Cost in the Integration of Security Features in Integrated Circuits for Smart Cards

This essay investigates the role of cost in the development and producti...

Please sign up or login with your details

Forgot password? Click here to reset