Security modelling and analysis of dynamic enterprise networks

Simon Enoch Yusuf, Mengmeng Ge, Jin B. Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim

Research output: Chapter in Book/Conference paperConference paper

15 Citations (Scopus)

Abstract

Dynamic networks can be characterised by many factors such as changes (e.g., vulnerability change, update of applications and services, topology changes). It is of vital importance to assess the security of such dynamic networks in order to improve the security of them. One way to assess the security is to use a graphical security model. However, the existing graphical security models (e.g., attack graphs and attack trees) have only considered static networks (i.e. the network does not change). It is also unclear how the existing cyber security metrics (e.g., attack cost, shortest attack path) change when the network configuration changes over time. To address this problem, we propose (i) to develop a novel graphical security model named Temporal-Hierarchical Attack Representation Model (T-HARM) to capture network changes and (ii) investigate the effect of network change on the existing cyber security metrics based on the proposed security model. We show how the existing security metrics change when the status of vulnerabilities changes.

Original languageEnglish
Title of host publicationProceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016
Place of PublicationUSA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages249-256
Number of pages8
ISBN (Electronic)9781509043149
DOIs
Publication statusPublished - 10 Mar 2017
Externally publishedYes
Event16th IEEE International Conference on Computer and Information Technology, CIT 2016 - Nadi, Fiji
Duration: 7 Dec 201610 Dec 2016

Conference

Conference16th IEEE International Conference on Computer and Information Technology, CIT 2016
CountryFiji
CityNadi
Period7/12/1610/12/16

Fingerprint

Industry
Topology
Costs

Cite this

Yusuf, S. E., Ge, M., Hong, J. B., Kim, H. K., Kim, P., & Kim, D. S. (2017). Security modelling and analysis of dynamic enterprise networks. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016 (pp. 249-256). [7876345] USA: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/CIT.2016.88
Yusuf, Simon Enoch ; Ge, Mengmeng ; Hong, Jin B. ; Kim, Huy Kang ; Kim, Paul ; Kim, Dong Seong. / Security modelling and analysis of dynamic enterprise networks. Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. USA : IEEE, Institute of Electrical and Electronics Engineers, 2017. pp. 249-256
@inproceedings{1d520649736a4bdcb6faa47643d88335,
title = "Security modelling and analysis of dynamic enterprise networks",
abstract = "Dynamic networks can be characterised by many factors such as changes (e.g., vulnerability change, update of applications and services, topology changes). It is of vital importance to assess the security of such dynamic networks in order to improve the security of them. One way to assess the security is to use a graphical security model. However, the existing graphical security models (e.g., attack graphs and attack trees) have only considered static networks (i.e. the network does not change). It is also unclear how the existing cyber security metrics (e.g., attack cost, shortest attack path) change when the network configuration changes over time. To address this problem, we propose (i) to develop a novel graphical security model named Temporal-Hierarchical Attack Representation Model (T-HARM) to capture network changes and (ii) investigate the effect of network change on the existing cyber security metrics based on the proposed security model. We show how the existing security metrics change when the status of vulnerabilities changes.",
keywords = "Attack graphs, Attack trees, Graphical security model, Security metrics",
author = "Yusuf, {Simon Enoch} and Mengmeng Ge and Hong, {Jin B.} and Kim, {Huy Kang} and Paul Kim and Kim, {Dong Seong}",
year = "2017",
month = "3",
day = "10",
doi = "10.1109/CIT.2016.88",
language = "English",
pages = "249--256",
booktitle = "Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States",

}

Yusuf, SE, Ge, M, Hong, JB, Kim, HK, Kim, P & Kim, DS 2017, Security modelling and analysis of dynamic enterprise networks. in Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016., 7876345, IEEE, Institute of Electrical and Electronics Engineers, USA, pp. 249-256, 16th IEEE International Conference on Computer and Information Technology, CIT 2016, Nadi, Fiji, 7/12/16. https://doi.org/10.1109/CIT.2016.88

Security modelling and analysis of dynamic enterprise networks. / Yusuf, Simon Enoch; Ge, Mengmeng; Hong, Jin B.; Kim, Huy Kang; Kim, Paul; Kim, Dong Seong.

Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. USA : IEEE, Institute of Electrical and Electronics Engineers, 2017. p. 249-256 7876345.

Research output: Chapter in Book/Conference paperConference paper

TY - GEN

T1 - Security modelling and analysis of dynamic enterprise networks

AU - Yusuf, Simon Enoch

AU - Ge, Mengmeng

AU - Hong, Jin B.

AU - Kim, Huy Kang

AU - Kim, Paul

AU - Kim, Dong Seong

PY - 2017/3/10

Y1 - 2017/3/10

N2 - Dynamic networks can be characterised by many factors such as changes (e.g., vulnerability change, update of applications and services, topology changes). It is of vital importance to assess the security of such dynamic networks in order to improve the security of them. One way to assess the security is to use a graphical security model. However, the existing graphical security models (e.g., attack graphs and attack trees) have only considered static networks (i.e. the network does not change). It is also unclear how the existing cyber security metrics (e.g., attack cost, shortest attack path) change when the network configuration changes over time. To address this problem, we propose (i) to develop a novel graphical security model named Temporal-Hierarchical Attack Representation Model (T-HARM) to capture network changes and (ii) investigate the effect of network change on the existing cyber security metrics based on the proposed security model. We show how the existing security metrics change when the status of vulnerabilities changes.

AB - Dynamic networks can be characterised by many factors such as changes (e.g., vulnerability change, update of applications and services, topology changes). It is of vital importance to assess the security of such dynamic networks in order to improve the security of them. One way to assess the security is to use a graphical security model. However, the existing graphical security models (e.g., attack graphs and attack trees) have only considered static networks (i.e. the network does not change). It is also unclear how the existing cyber security metrics (e.g., attack cost, shortest attack path) change when the network configuration changes over time. To address this problem, we propose (i) to develop a novel graphical security model named Temporal-Hierarchical Attack Representation Model (T-HARM) to capture network changes and (ii) investigate the effect of network change on the existing cyber security metrics based on the proposed security model. We show how the existing security metrics change when the status of vulnerabilities changes.

KW - Attack graphs

KW - Attack trees

KW - Graphical security model

KW - Security metrics

UR - http://www.scopus.com/inward/record.url?scp=85017346105&partnerID=8YFLogxK

U2 - 10.1109/CIT.2016.88

DO - 10.1109/CIT.2016.88

M3 - Conference paper

SP - 249

EP - 256

BT - Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - USA

ER -

Yusuf SE, Ge M, Hong JB, Kim HK, Kim P, Kim DS. Security modelling and analysis of dynamic enterprise networks. In Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016. USA: IEEE, Institute of Electrical and Electronics Engineers. 2017. p. 249-256. 7876345 https://doi.org/10.1109/CIT.2016.88