Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Title | Scalable Security Models for Assessing Effectiveness of Moving Target Defenses |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Hong, J.B., Dong Seong Kim |
Conference Name | Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on |
Date Published | June |
Keywords | Analytical models, Attack Graphs, Attack Representation Model, Computational modeling, Diversity methods, effectiveness assessment, exhaustive search method, graph theory, HARMs, hierarchical attack representation models, importance measures, IMs, Internet, Linux, Measurement, moving target defense, moving target defenses, MTD, networked system security, scalable security models, security, security analysis, security assessment, Security Modeling Techniques, security of data |
Abstract | Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart attacks. Various MTD techniques are developed to enhance the security of a networked system, but the effectiveness of these techniques is not well assessed. Security models (e.g., Attack Graphs (AGs)) provide formal methods of assessing security, but modeling the MTD techniques in security models has not been studied. In this paper, we incorporate the MTD techniques in security modeling and analysis using a scalable security model, namely Hierarchical Attack Representation Models (HARMs), to assess the effectiveness of the MTD techniques. In addition, we use importance measures (IMs) for scalable security analysis and deploying the MTD techniques in an effective manner. The performance comparison between the HARM and the AG is given. Also, we compare the performance of using the IMs and the exhaustive search method in simulations. |
URL | https://ieeexplore.ieee.org/document/6903607/?arnumber=6903607 |
DOI | 10.1109/DSN.2014.54 |
Citation Key | 6903607 |
- internet
- security of data
- Security Modeling Techniques
- security assessment
- Security analysis
- security
- scalable security models
- networked system security
- MTD
- moving target defenses
- moving target defense
- Measurement
- Linux
- Analytical models
- IMs
- importance measures
- hierarchical attack representation models
- HARMs
- graph theory
- exhaustive search method
- effectiveness assessment
- Diversity methods
- Computational modeling
- Attack Representation Model
- attack graphs