首页> 外文学位 >Towards an efficient vulnerability analysis methodology for better security risk management.
【24h】

Towards an efficient vulnerability analysis methodology for better security risk management.

机译:寻求一种有效的漏洞分析方法,以进行更好的安全风险管理。

获取原文
获取原文并翻译 | 示例

摘要

Risk management is a process that allows IT managers to balance between cost of the protective measures and gains in mission capability. A system administrator has to make a decision and choose an appropriate security plan that maximizes the resource utilization. However, making the decision is not a trivial task. Most organizations have tight budgets for IT security; therefore, the chosen plan must be reviewed as thoroughly as other management decisions.;Unfortunately, even the best-practice security risk management frameworks do not provide adequate information for effective risk management. Vulnerability scanning and penetration testing that form the core of traditional risk management, identify only the set of system vulnerabilities. Given the complexity of today's network infrastructure, it is not enough to consider the presence or absence of vulnerabilities in isolation. Materializing a threat strongly requires the combination of multiple attacks using different vulnerabilities. Such a requirement is far beyond the capabilities of current day vulnerability scanners. Consequently, assessing the cost of an attack or cost of implementing appropriate security controls is possible only in a piecemeal manner.;In this work, we develop and formalize new network vulnerability analysis model. The model encodes in a concise manner, the contributions of different security conditions that lead to system compromise. We extend the model with a systematic risk assessment methodlogy to support reasoning under uncertainty in an attempt to evaluate the vulnerability exploitation probability. We develop a cost model to quantify the potential loss and gain that can occur in a system if certain conditions are met (or protected). We also quantify the security control cost incurred to implement a set of security hardening measures. We propose solutions for the system administrator's decision problems covering the area of the risk analysis and risk mitigation analysis. Finally, we extend the vulnerability assessment model to the areas of intrusion detection and forensic investigation.
机译:风险管理是使IT经理能够在保护措施的成本和执行任务的能力之间取得平衡的过程。系统管理员必须做出决定并选择适当的安全计划,以最大程度地利用资源。但是,做出决定并不是一件容易的事。大多数组织在IT安全方面都有严格的预算。因此,所选择的计划必须与其他管理决策一样进行彻底的审查。不幸的是,即使是最佳实践的安全风险管理框架也无法提供有效的风险管理所需的足够信息。漏洞扫描和渗透测试构成传统风险管理的核心,只能识别系统漏洞集。考虑到当今网络基础架构的复杂性,仅考虑是否存在漏洞是不够的。实现威胁强烈需要使用不同漏洞的多种攻击的组合。这样的要求远远超出了当今漏洞扫描程序的能力。因此,评估攻击的成本或实施适当的安全控制的成本仅是零星的。该模型以简洁的方式对导致系统危害的不同安全条件的贡献进行编码。我们使用系统的风险评估方法对模型进行扩展,以支持不确定性下的推理,从而尝试评估漏洞利用概率。我们开发了一种成本模型,以量化在满足(或保护)某些条件的情况下系统中可能发生的潜在损失和收益。我们还量化了实施一套安全强化措施所产生的安全控制成本。我们为系统管理员的决策问题提出了解决方案,涵盖了风险分析和风险缓解分析领域。最后,我们将漏洞评估模型扩展到入侵检测和法医调查领域。

著录项

  • 作者

    Poolsappasit, Nayot.;

  • 作者单位

    Colorado State University.;

  • 授予单位 Colorado State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 180 p.
  • 总页数 180
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号