A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
Title | A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Naghmouchi, M. Yassine, Perrot, Nancy, Kheir, Nizar, Mahjoub, A. Ridha, Wary, Jean-Philippe |
Conference Name | Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4571-2 |
Keywords | complex ICT systems, Computing Theory, Damage Assessment, graph theory, Human Behavior, malware analysis, Metrics, privacy, pubcrawl, Resiliency, risk assessment, security metrics |
Abstract | In this paper, we propose a new risk analysis framework that enables to supervise risks in complex and distributed systems. Our contribution is twofold. First, we provide the Risk Assessment Graphs (RAGs) as a model of risk analysis. This graph-based model is adaptable to the system changes over the time. We also introduce the potentiality and the accessibility functions which, during each time slot, evaluate respectively the chance of exploiting the RAG's nodes, and the connection time between these nodes. In addition, we provide a worst-case risk evaluation approach, based on the assumption that the intruder threats usually aim at maximising their benefits by inflicting the maximum damage to the target system (i.e. choosing the most likely paths in the RAG). We then introduce three security metrics: the propagated risk, the node risk and the global risk. We illustrate the use of our framework through the simple example of an enterprise email service. Our framework achieves both flexibility and generality requirements, it can be used to assess the external threats as well as the insider ones, and it applies to a wide set of applications. |
URL | http://doi.acm.org/10.1145/2995959.2995969 |
DOI | 10.1145/2995959.2995969 |
Citation Key | naghmouchi_new_2016 |