Skip to main navigation Skip to search Skip to main content

Cost evaluation for intrusion response using dependency graphs

  • Nizar Kheir
  • , Hervé Debar
  • , Nora Cuppens-Boulahia
  • , Frédéric Cuppens
  • , Jouni Viinikka

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The cost evaluation for attacks and/or responses (further called security incidents) in an IT system is a challenging issue. The high rate of service dependencies increases this challenge as the impact on a target service often spreads to its dependent services. This paper evaluates the effect of security incidents using service dependency graphs. It defines security-related properties which are used to propagate impacts in a dependency graph and thus to quantify the real cost of a security incident. The graph-based model described in this paper manages Confidentiality (C), Integrity (I) and Availability (A) propagations. It introduces matrix dependency weights in order to correlate these propagations. It also examines the effect of availability on both C and I propagations as these may exist only when the underlying components are available. This model provides common metrics for both attack and response costs evaluation. It thus enables balancing attack and response costs. An implementation of this model is proposed using CVSS base vectors. The performance of the model is measured according to the graph size and the rate of dependencies in this graph.

Original languageEnglish
Title of host publication2009 International Conference on Network and Service Security, N2S 2009
Publication statusPublished - 23 Nov 2009
Externally publishedYes
Event2009 International Conference on Network and Service Security, N2S 2009 - Paris, France
Duration: 24 Jun 200926 Jun 2009

Publication series

Name2009 International Conference on Network and Service Security, N2S 2009

Conference

Conference2009 International Conference on Network and Service Security, N2S 2009
Country/TerritoryFrance
CityParis
Period24/06/0926/06/09

Fingerprint

Dive into the research topics of 'Cost evaluation for intrusion response using dependency graphs'. Together they form a unique fingerprint.

Cite this