Visible to the public Scalable Security Models for Assessing Effectiveness of Moving Target Defenses

TitleScalable Security Models for Assessing Effectiveness of Moving Target Defenses
Publication TypeConference Paper
Year of Publication2014
AuthorsHong, J.B., Dong Seong Kim
Conference NameDependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on
Date PublishedJune
KeywordsAnalytical models, Attack Graphs, Attack Representation Model, Computational modeling, Diversity methods, effectiveness assessment, exhaustive search method, graph theory, HARMs, hierarchical attack representation models, importance measures, IMs, Internet, Linux, Measurement, moving target defense, moving target defenses, MTD, networked system security, scalable security models, security, security analysis, security assessment, Security Modeling Techniques, security of data
Abstract

Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart attacks. Various MTD techniques are developed to enhance the security of a networked system, but the effectiveness of these techniques is not well assessed. Security models (e.g., Attack Graphs (AGs)) provide formal methods of assessing security, but modeling the MTD techniques in security models has not been studied. In this paper, we incorporate the MTD techniques in security modeling and analysis using a scalable security model, namely Hierarchical Attack Representation Models (HARMs), to assess the effectiveness of the MTD techniques. In addition, we use importance measures (IMs) for scalable security analysis and deploying the MTD techniques in an effective manner. The performance comparison between the HARM and the AG is given. Also, we compare the performance of using the IMs and the exhaustive search method in simulations.

URLhttps://ieeexplore.ieee.org/document/6903607/?arnumber=6903607
DOI10.1109/DSN.2014.54
Citation Key6903607