Visible to the public A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems

TitleA New Risk Assessment Framework Using Graph Theory for Complex ICT Systems
Publication TypeConference Paper
Year of Publication2016
AuthorsNaghmouchi, M. Yassine, Perrot, Nancy, Kheir, Nizar, Mahjoub, A. Ridha, Wary, Jean-Philippe
Conference NameProceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4571-2
Keywordscomplex ICT systems, Computing Theory, Damage Assessment, graph theory, Human Behavior, malware analysis, Metrics, privacy, pubcrawl, Resiliency, risk assessment, security metrics
Abstract

In this paper, we propose a new risk analysis framework that enables to supervise risks in complex and distributed systems. Our contribution is twofold. First, we provide the Risk Assessment Graphs (RAGs) as a model of risk analysis. This graph-based model is adaptable to the system changes over the time. We also introduce the potentiality and the accessibility functions which, during each time slot, evaluate respectively the chance of exploiting the RAG's nodes, and the connection time between these nodes. In addition, we provide a worst-case risk evaluation approach, based on the assumption that the intruder threats usually aim at maximising their benefits by inflicting the maximum damage to the target system (i.e. choosing the most likely paths in the RAG). We then introduce three security metrics: the propagated risk, the node risk and the global risk. We illustrate the use of our framework through the simple example of an enterprise email service. Our framework achieves both flexibility and generality requirements, it can be used to assess the external threats as well as the insider ones, and it applies to a wide set of applications.

URLhttp://doi.acm.org/10.1145/2995959.2995969
DOI10.1145/2995959.2995969
Citation Keynaghmouchi_new_2016