640 likes | 812 Views
Selection of optimal countermeasure portfolio in IT security planning. Author : Tadeusz Sawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser : Frank, Yeong -Sung Lin Presenter: Yi- Cin Lin. Agenda. Introduction Problem description Model
E N D
Selection of optimal countermeasure portfolio in IT security planning Author: TadeuszSawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin
Agenda • Introduction • Problem description • Model • Single-objective approach • Bi-objective approach • Computational examples • Conclusion
Agenda • Introduction • Problem description • Model • Single-objective approach • Bi-objective approach • Computational examples • Conclusion
Introduction • The variousactions developed to prevent intrusions or to mitigate the impact of successful breaches are called controls or countermeasures.
Introduction • In practice, even the most sophisticated countermeasures cannot be expected to completely block attacks. • This paper deals with the optimal selection of countermeasures in IT security planning to prevent or mitigate cyber-threats and a mixed integer programming approach is proposed for the decision making.
Introduction • The problem is formulated as a single- or bi-objective mixed integer program
Introduction • The bi-objective trade-off model provides the decision maker with a simple tool for balancing expected and worst-case losses and for shaping of the resulting cost distribution through the selection of optimal subset of countermeasures.
Agenda • Introduction • Problem description • Models • Single-objective approach • Bi-objective approach • Computational examples • Conclusion
Problem description • The blocking effectiveness of each countermeasure is assumed to be independent whether or not it is used alone or together with other countermeasures.
Problem description • Notation • Total of potential scenarios.
Problem description • Denote by the probability of threat . • Notation • The probability of attack scenario in the presence of independent threat events is
Problem description • Notation • indicates that countermeasure totally prevents successful attacks of threat . • denotes that countermeasure is totally incapable of mitigating threat .
Problem description • The proportion of successful attacks of threats type that survive all countermeasures in the subset of selected countermeasures is • The expected proportion of successful attacks of threat type for the subset of selected countermeasures is
Problem description • Notation • The subset of selected countermeasures must satisfy the available budget constraint
Problem description • The decision maker needs to decide which countermeasures to select to minimize losses from surviving occurrences of threats under limited budget for countermeasures implementation.
Agenda • Introduction • Problem description • Model • Single-objective approach • Bi-objective approach • Computational examples • Conclusion
Model • In a risk-neutral operating condition the overall quality of the selected countermeasure portfolio can be measured by the expected cost of losses from successful attacks.
Minimization of expected cost- NSP_E • Notation • Countermeasure is selected for implementation if , otherwise .
Minimization of expected cost- NSP_E • Countermeasure is selected at exactly one level i.e., • Notation
Minimization of expected cost- NSP_E • The proportion of successful attacks of threats type that survive all selected countermeasures is • As a result, the expected cost of losses from successful attacks is given by a nonlinear formula
Minimization of expected cost- NSP_E • Model NSP_E: Minimize Expected Cost (1) Subject to 1. Countermeasure selection constraints
Minimization of expected cost- NSP_E Subject to 2.Integrality conditions: • The nonlinear integer program NSP_E is computationally hard for solving, even for small size instances of the problem.
Minimization of expected cost- SP_E • The nonlinear objective function (1) can be replaced with a formula
Minimization of expected cost- SP_E • In order to compute for each threat , a recursive procedure is proposed below.
Minimization of expected cost- SP_E • For each threat and countermeasure can be calculatedrecursively as follows. • The initial conditionis • The remaining terms
Minimization of expected cost- SP_E • In order to eliminate nonlinear terms in the right-hand side of Eq. (10), define an auxiliary variable
Minimization of expected cost- SP_E and, in particular, for
Minimization of expected cost- SP_E • Comparison of Eqs. (12) and (15) produces to the following relation
Minimization of expected cost- SP_E • The above procedure eliminates all variables for each. • Summarizing, the proportion of successful attacks = in Foreach threat can be calculated recursively, using Eqs. (17), (16) and(13) with replaced by.
Minimization of expected cost- SP_E • Model SP_E: Minimize Expected Cost (5) subject to 1. Countermeasure selection constraints Eqs. (2) and (3).
Minimization of expected cost- SP_E Subject to 2. Surviving threats balance constraints (17) (16) (15)
Minimization of expected cost- SP_E Subject to 3. Non-negativity and integrality conditions: (4)
Selection of optimal countermeasure portfolio in IT security planning Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin
Model • In a risk-neutral operating condition the overall quality of the selected countermeasure portfolio can be measured by the expected cost of losses from successful attacks.
Minimize conditional value-at-risk • Notation • Model SP_CV: Minimize
Minimize conditional value-at-risk Subject to 1. Countermeasure selection constraints: Eqs. (2)–(3). 2. Surviving threats balance constraints: Eqs. (18)–(21). 3. Risk constraints: 4. Non-negativity and integrality conditions: Eqs. (22)–(24)
Minimize conditional value-at-risk • Models SP_E and SP_CV can be enhanced for simultaneous optimization of the expenditures on countermeasures and the cost of losses from successful attacks. • Removed constraints (3)
Minimize conditional value-at-risk • Model SP_E+B Minimize Required Budget and Expected Cost subject to Eqs. (2), (18)–(24) and (28)
Minimize conditional value-at-risk • Model SP_CV+B Minimize Required Budget and CVaR subject to Eqs. (2) and (18)–(28)
Agenda • Introduction • Problem description • Model • Single-objective approach • Bi-objective approach • Computational examples • Conclusion
Bi-objective approach • In the single objective approach the countermeasure portfolio is selected by minimizing either the expected loss (plus the required budget) or the expected worst-case loss (plus the required budget).
Bi-objective approach • Model WSP Minimize Subject to Eqs. (2), (5) and (18)–(28)
Bi-objective approach • Decision maker controls • Risk of high losses by choosing the confidence level α • trade-off between expected and worst-case losses by choosing the trade-off parameter λ.
Agenda • Introduction • Problem description • Model • Single-objective approach • Bi-objective approach • Computational examples • Conclusion
Computational examples • The data set is similar to the one presented in [20], which was based on the threat set reported on IT security forum EndpointSecurity.org
Computational examples • =,the number of threats and the number of countermeasures, were equal to 10, and the corresponding number of potential attack scenarios, was equal to 1024.