Skip to main content

Mitigating Security Risks Through Attack Strategies Exploration

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11245))

Abstract

Security assessment of organization’s information systems is becoming increasingly complex due to their growing sizes and underlying architectures, e.g., cloud. Analyzing potential attacks is a pragmatic approach that provides insightful information to achieve this purpose. In this work, we propose to synthesize defense configurations to counter sophisticated attack strategies minimizing resource usage while ensuring a high probability of success. For this, we combine Statistical Model Checking techniques with Genetic Algorithms. Experiments performed on real-life case studies show substantial improvements compared to existing techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This reflects a realistic behavior expressing the monotony of an attack.

  2. 2.

    In this work, we restrict to static strategies, i.e., the same in any state. Considering dynamic strategies is a future work.

  3. 3.

    Further details are provided in Appendix A.

  4. 4.

    Except for the first three cases in BGP where the probability of success is 0.

References

  1. Baker, G.H., Berg, A.: Supervisory control and data acquisition (SCADA) systems. Crit. Infrastruct. Prot. Rep. 1(6), 5–6 (2002)

    Google Scholar 

  2. Butts, J.W., Mills, R.F., Baldwin, R.O.: Developing an insider threat model using functional decomposition. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 412–417. Springer, Heidelberg (2005). https://doi.org/10.1007/11560326_32

    Chapter  Google Scholar 

  3. Convery, S., Cook, D., Franz, M.: An Attack Tree for the Border Gateway Protocol. Cisco Internet Draft (2002)

    Google Scholar 

  4. Edge, K.S., Dalton, G.C., Raines, R.A., Mills, R.F.: Using attack and protection trees to analyze threats and defenses to homeland security. In: Military Communications Conference, MILCOM 2006, pp. 1–7. IEEE (2006)

    Google Scholar 

  5. Gadyatskaya, O., Hansen, R.R., Larsen, K.G., Legay, A., Olesen, M.C., Poulsen, D.B.: Modelling attack-defense trees using timed automata. In: Fränzle, M., Markey, N. (eds.) FORMATS 2016. LNCS, vol. 9884, pp. 35–50. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44878-7_3

    Chapter  MATH  Google Scholar 

  6. Hérault, T., Lassaigne, R., Magniette, F., Peyronnet, S.: Approximate probabilistic model checking. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 73–84. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24622-0_8

    Chapter  MATH  Google Scholar 

  7. Sans ICS: Analysis of the cyber attack on the Ukrainian power grid (2016). Accessed 25 Apr 2018

    Google Scholar 

  8. Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack–defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80–95. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19751-2_6

    Chapter  Google Scholar 

  9. Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186–198. Springer, Heidelberg (2005). https://doi.org/10.1007/11734727_17

    Chapter  Google Scholar 

  10. Mediouni, B.L., Niar, S., Benmansour, R., Benatchba, K., Koudil, M.: A bi-objective heuristic for heterogeneous MPSoC design space exploration. In: 2015 10th International Design & Test Symposium (IDT), pp. 90–95. IEEE (2015)

    Google Scholar 

  11. Roy, A., Kim, D.S., Trivedi, K.S.: Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Secur. Commun. Netw. 5(8), 929–943 (2012)

    Article  Google Scholar 

  12. Wang, P., Lin, W.-H., Kuo, P.-T., Lin, H.-T., Wang, T.C.: Threat risk analysis for cloud security based on attack-defense trees. In: ICCM, pp. 106–111 (2012)

    Google Scholar 

  13. Younes, H.L.S.: Verification and planning for stochastic processes with asynchronous events. Ph.D. thesis, Carnegie Mellon (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Braham Lotfi Mediouni .

Editor information

Editors and Affiliations

A Case Studies Description

A Case Studies Description

In the following case study descriptions, attack actions are characterized by their lower (LB) and upper (UB) time bounds, the required resources (Cost) and their probability to succeed (Env). In the ADTs, attack actions are represented by ellipses and defense actions by rectangles.

1.1 A.1 An Organization System Attack (ORGA) [5]

See (Fig. 6).

Fig. 6.
figure 6

ORGA case study description

1.2 A.2 Resetting a BGP Session (BGP) [3]

We constructed this case study based on [11], in which detection and mitigation events are attached with success probabilities (resp. \(P_D\) and \(P_M\)). We transpose these probabilities to the attack actions in a straightforward manner: the probability of an attack action to succeed is computed as the probability that all the implemented countermeasures set to block it, fail. For example, the attack action sa can be blocked by both defense actions au and rn. So, the probability of sa to succeed equals \(Env(sa) = (1-P_{D1}\times P_{M1})\times (1-P_{D2}\times P_{M2})\), where \(P_{D1}\), \(P_{D2}\), \(P_{M1}\) and \(P_{M2}\) are given in [11]. Note that, in our case, a pair of detection-mitigation events is combined is a single defense action. For example, \(P_{D1}\) and \(P_{M1}\) are merged into a defense au, and, \(P_{D2}\) and \(P_{M2}\) into the defense action rn. Also, the defense mechanisms are fixed before starting an analysis and have a probability 1 (Fig. 7).

Fig. 7.
figure 7

Resetting a BGP session description

Fig. 8.
figure 8

SCADA system description

Fig. 9.
figure 9

A Malicious Insider attack (MI) description

1.3 A.3 Supervisory Control and Data Acquisition System (SCADA) [1]

Similarly to BGP, SCADA is inspired from [11]. This case study represents an example of how attack trees are used to answer the failure assessment problem where attack actions represent the possible hardware/software failures. Since we are interested to identify what an attacker can do to reach a malicious goal on a system, we then interpret these attack actions as an attacker trying to trigger a hardware/software failure. So, in addition to the transposition from probabilities of successful defenses to probabilities of successful attack actions, Env also scales with the probability of failures. For example, the probability of g1 to succeed, provided it is guarded by a defense rst1, is computed as: \(Env(g1) = P_{g1} \times (1- P_D \times P_M)\), where the probabilities of a failure of the controlling agent one \(P_{g1}\), the detection of its failure \(P_D\) and its restarting \(P_M\) are given in [11].

In Fig. 8a, the operator “2/3” is a shortcut designating the case where at least two events \(s_i\) and \(s_j\) occur, with \(i\ne j\). It is equivalent to the boolean expression \(\phi = (s1 \wedge s2)\vee (s1 \wedge s3)\vee (s2 \wedge s3)\).

1.4 A.4 A Malicious Insider Attack (MI) [2]

In what follows, we describe a Malicious Insider attack (MI). It is presented in [11] and is adapted to our context in a similar way to BGP (Fig. 9).

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mediouni, B.L., Nouri, A., Bozga, M., Legay, A., Bensalem, S. (2018). Mitigating Security Risks Through Attack Strategies Exploration. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Verification. ISoLA 2018. Lecture Notes in Computer Science(), vol 11245. Springer, Cham. https://doi.org/10.1007/978-3-030-03421-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03421-4_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03420-7

  • Online ISBN: 978-3-030-03421-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics