Trudy SPIIRAN
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Trudy SPIIRAN, 2018, Issue 57, Pages 211–240
DOI: https://doi.org/10.15622/sp.57.9
(Mi trspy1003)
 

This article is cited in 5 scientific papers (total in 5 papers)

Information Security

Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection

E. V. Doynikovaab, I. V. Kotenkoab

a ITMO University (Saint Petersburg National Research University of Information Technologies, Mechanics and Optics)
b St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences (SPIIRAS)
Abstract: Both timely and adequate response on the computer security incidents and organization losses from the computer attacks depend on the accuracy of situation recognition under the cybersecurity monitoring. The paper is devoted to the enhancement of the attack models in the form of attack graphs for the cybersecurity monitoring tasks. A number of important issues related to the application of attack graphs and their solutions are considered. They include inaccuracies in the definition of the pre- and post-conditions of attack actions, the processing of attack graph cycles for the application of Bayesian inference for the attack graph analysis, the mapping of security incidents on an attack graph, the automatic countermeasure selection in case of a high security risk level. The paper demonstrates a software prototype of the security monitoring system component which was earlier implemented and modified considering the suggested enhancements. The results of experiments are described. The influence of the modifications on the cybersecurity monitoring results is shown on a case study.
Keywords: attack graph; attack probability; cybersecurity monitoring; computer networks; security assessment; security metrics; attack response; vulnerability assessment.
Funding agency Grant number
Russian Foundation for Basic Research 16-37-00338
16-29-09482
18-07-01488
Ministry of Education and Science of the Russian Federation МК-314.2017.9
СП-751.2018.5
074-U01
Russian Academy of Sciences - Federal Agency for Scientific Organizations 0073-2015-0004
0073-2015-0007
This research is supported by RFBR (projects No. 16-37-00338, 16-29-09482 and 18-07-01488), Grants of the President of the Russian Federation No. MK314.2017.9, SP-751.2018.5, by the budget (projects No. 0073-2015-0004 and 0073-2015-0007), and by Government of the Russian Federation, Grant 074-U01.
Bibliographic databases:
Document Type: Article
UDC: 004.056
Language: Russian
Citation: E. V. Doynikova, I. V. Kotenko, “Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection”, Tr. SPIIRAN, 57 (2018), 211–240
Citation in format AMSBIB
\Bibitem{DoyKot18}
\by E.~V.~Doynikova, I.~V.~Kotenko
\paper Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection
\jour Tr. SPIIRAN
\yr 2018
\vol 57
\pages 211--240
\mathnet{http://mi.mathnet.ru/trspy1003}
\crossref{https://doi.org/10.15622/sp.57.9}
\elib{https://elibrary.ru/item.asp?id=32761925}
Linking options:
  • https://www.mathnet.ru/eng/trspy1003
  • https://www.mathnet.ru/eng/trspy/v57/p211
  • This publication is cited in the following 5 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
    Statistics & downloads:
    Abstract page:505
    Full-text PDF :530
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024