Difficulty-level metric for cyber security training

作者: Zequn Huang , Chien-Chung Shen , Sheetal Doshiy , Nimmi Thomasy , Ha Duong

DOI: 10.1109/COGSIMA.2015.7108194

关键词: Computer securityCognitionAggregate (data warehouse)Metric (mathematics)Computer scienceComponent (UML)Learning environmentProbabilistic logicIterative and incremental developmentBayesian inference

摘要: Cyber security training systems work as a suitable learning environment for educating cyber analysts on how to detect and defense before real attacks happen. As is an iterative process, the assessment component not only assesses knowledge gained by analysts, but also adjusts difficulty of lessons accordingly based analysts’ performance. In this paper, we present attack graphbased probabilistic metric measure lesson scenarios’ levels. Based causal relationships between vulnerabilities in graph, apply Bayesian Reasoning aggregate individual into value representing attackers success likelihood achieve goal. However, one major complication using that it does allow cycles, which exists graphs. We identify different types cycles graphs propose efficient algorithm remove while preserving cyclic influence probability calculation.

参考文章(27)
Sudhakar Govindavajhala, Xinming Ou, Andrew W. Appel, MulVAL: a logic-based network security analyzer usenix security symposium. pp. 8- 8 ,(2005)
John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen, Improving Attack Graph Visualization through Data Reduction and Attack Grouping visualization for computer security. pp. 68- 79 ,(2008) , 10.1007/978-3-540-85933-8_7
Sushil Jajodia, Topological analysis of network attack vulnerability Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 2- 2 ,(2007) , 10.1145/1229285.1229288
Karen Scarfone, Peter Mell, An analysis of CVSS version 2 vulnerability scoring empirical software engineering and measurement. pp. 516- 525 ,(2009) , 10.1109/ESEM.2009.5314220
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia, Measuring network security using dynamic bayesian network Proceedings of the 4th ACM workshop on Quality of protection - QoP '08. pp. 23- 30 ,(2008) , 10.1145/1456362.1456368
Paul Ammann, Duminda Wijesekera, Saket Kaushik, Scalable, graph-based network vulnerability analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 217- 224 ,(2002) , 10.1145/586110.586140
Maneesh Varshney, Kent Pickett, Rajive Bagrodia, A Live-Virtual-Constructive (LVC) framework for cyber operations test, evaluation and training military communications conference. pp. 1387- 1392 ,(2011) , 10.1109/MILCOM.2011.6127499