Optimal Deployment of Security Policies: Application to Industrial Control Systems

Ziad Ismail, Jean Leneutre, Alia Fourati

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The management of security resources in a system always comes with a tradeoff. Given technical and budget constraints, the defender focuses on deploying the set of security countermeasures that offer the best level of system protection. However, optimizing the configuration and deployment of defense countermeasures for efficient attack detection and mitigation remains a challenging task. In this paper, we leverage the information present in an attack graph, representing the evolution of the state of the attacker in the system, to tackle the problem of finding the optimal security policy that offers the maximum level of system protection. Our solution can be used to assist asset owners to prioritize the deployment of security countermeasures and respond to intrusions efficiently. We validate our approach on an Advanced Metering Infrastructure (AMI) case study.

Original languageEnglish
Title of host publicationProceedings - 2018 14th European Dependable Computing Conference, EDCC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages120-127
Number of pages8
ISBN (Electronic)9781538680605
DOIs
Publication statusPublished - 9 Nov 2018
Externally publishedYes
Event14th European Dependable Computing Conference, EDCC 2018 - Iasi, Romania
Duration: 10 Sept 201814 Sept 2018

Publication series

NameProceedings - 2018 14th European Dependable Computing Conference, EDCC 2018

Conference

Conference14th European Dependable Computing Conference, EDCC 2018
Country/TerritoryRomania
CityIasi
Period10/09/1814/09/18

Keywords

  • Security policy
  • intrusion response
  • optimization

Fingerprint

Dive into the research topics of 'Optimal Deployment of Security Policies: Application to Industrial Control Systems'. Together they form a unique fingerprint.

Cite this