RMIT University
Browse

Security Modelling and Analysis of Dynamic Enterprise Networks

conference contribution
posted on 2024-11-03, 14:35 authored by Simon Enoch, Mengmeng Ge, Jin-Bum Hong, Huy Kim, Paul Kim, Dong Seong Kim
Dynamic networks can be characterised by many factors such as changes (e.g., vulnerability change, update of applications and services, topology changes). It is of vital importance to assess the security of such dynamic networks in order to improve the security of them. One way to assess the security is to use a graphical security model. However, the existing graphical security models (e.g., attack graphs and attack trees) have only considered static networks (i. e. the network does not change). It is also unclear how the existing cyber security metrics (e.g., attack cost, shortest attack path) change when the network configuration changes over time. To address this problem, we propose (i) to develop a novel graphical security model named Temporal-Hierarchical Attack Representation Model (T-HARM) to capture network changes and (ii) investigate the effect of network change on the existing cyber security metrics based on the proposed security model. We show how the existing security metrics change when the status of vulnerabilities changes.

History

Related Materials

  1. 1.
    DOI - Is published in 10.1109/cit.2016.88
  2. 2.
    ISBN - Is published in 9781509043156 (urn:isbn:9781509043156)

Start page

249

End page

256

Total pages

8

Outlet

Proceedings of the 16th IEEE International Conference on Computer and Information Technology (CIT 2016)

Name of conference

CIT 2016

Publisher

IEEE

Place published

United States

Start date

2016-12-08

End date

2016-12-10

Language

English

Copyright

© 2016 IEEE

Former Identifier

2006110144

Esploro creation date

2021-10-01

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC