1 / 16

Ranking of security controlling strategies driven by quantitative threat analysis.

Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation " UNIFI-CNR Nicola Nostro , Andrea Ceccarelli , Ilaria Matteucci , Felicita Di Giandomenico Fai della Paganella - February 12, 2014. Outline.

Download Presentation

Ranking of security controlling strategies driven by quantitative threat analysis.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ranking of security controlling strategies driven by quantitative threat analysis. Tavolo 2: "Big data security evaluation" UNIFI-CNR Nicola Nostro, Andrea Ceccarelli, IlariaMatteucci, Felicita Di Giandomenico Fai dellaPaganella -February 12, 2014

  2. Outline • General description of work • Basics • Architecture/Framework • Use case • Conclusions and future works

  3. General description of the work • Security analysis and design are key activities for the protection of critical systems and infrastructure. • Traditional approaches: • Apply a qualitative threat assessment • Results used as input for the security design such that appropriate countermeasures are selected • Our work: selection and ranking of security controlling strategies driven by quantitative threat analysis • Threat analysis that identifies attack points and paths, and ranks attacks (costs, difficulty, ...) • Such enriched information is used for more elaborated controlling strategies that derive the appropriate monitoring rules and select countermeasures.

  4. Basics – Threat Analysis • Purpose is to create a data base of threats, vulnerabilities and countermeasures • Start from the identification of the assets to protect • identifies the potential vulnerabilities and the related threats • takes into account the severity of the threats • countermeasures plan are defined • A vulnerability is represented by a bug, a flaw, a weakness or exposure of an application; a system, a device or a service which could lead to issues of confidentiality, integrity or availability. • A threat represents the occurrence of a harmful event, by exploiting one or more vulnerabilities.

  5. Basics – Control strategies (1) A control strategy is defined in order to guarantee “security” at run-time. A security policy is expressed over the traces of the system. Guaranteeing security means that the controlled system satisfies security policies.

  6. Basics – Control strategies (2) • The truncation strategy recognizes bad sequences of actions and halts program execution before security property is violated, but cannot otherwise modify program behavior. • The suppression strategy can halt program execution and suppress individual program actions without terminating the program outright. • The insertion strategycan insert a sequence of actions into the program actions stream as well as terminate the program.

  7. Framework Architecture • Threat analysis supported by security models provides information on: • Attackers • Attacks and Attack points (as usual from threat analysis) • Attack paths • Relevance of the path (from a security viewpoint)/necessity of countermeasures • Weights: costs, probabilities • Security control strategies • Uses weights, relevance of the paths • Current objective: ranking of quantitative security controlling strategies • Final output is the definition of countermeasures based on the evaluation of the controlled paths

  8. High-level Workflow Threats Analysis Requirements Controlling strategies (system) functional requirements dependability and security requirements Design of security countermeasures

  9. Use case description • Critical system • Several categories of users • Heterogeneous devices • Security and Privacy requirements to protect • guarantees that authorized users do not compromise, counterfeit, steal or unnecessarily query data, or do not abuse of the data correlation and data search capacity behind what is strictly necessary for their work.

  10. ADVISE formalism • Attack Execution Graph (AEG) • attack graph with different nodes: attack steps, access domains, skills, and goals 2. Adversary Profile: the set of items initially owned, proficiency in attack skills, and policies: • payoff, costs, detection risk • The algorithm evaluates the reachable states for a planning horizon, and selects the most appealing E. LeMay, M.D. Ford, K. Keefe, W.H. Sanders, C. Muehrcke, “Model-based Security Metrics Using ADversaryVIew Security Evaluation (ADVISE)”. QEST 2011: 191-200

  11. (Insider) Threat analysis and AEG – resulting AEG Data TheftAttackExecutionGraph

  12. (insider) Threat analysis and AEG – quantitative results • Based on predefined metrics of interest • Attackers; • Critical paths, probability to follow a path; • Critical Attack Steps; • Attack costs; • ...

  13. Quantitative Control strategies • We can associate with each trace manipulation a measure, e.g., a cost. • Definition of a controller process trough a Generalized Process Algebra in which each step is associated with a value. Definition. Given a path t = (a1,k1) … (an,kn), the label of t is given by (a1 … an) belongs to Act*, and its run weight by |t| = k1 * … * knbelongs to K, where the product * denotes the product of the considered semiring K. The valuation of a process intuitively corresponds to the sum of all possible quantity of the traces belonging to the process.

  14. Is a Control strategies better than another? To select the controller strategy that better fit a set of requirements (e.g., the minimum cost) we associate to each step a value obtained by the threat analysis. wherek,k’ denote these values. ; ;

  15. Next Steps • Identification of appropriate Case Study • Preliminary version of paper in progress • Iterative approach to framework

More Related