Risk has to be assessed and managed with no historical data anytime we adopt a new technology or a system that widely differs from the previous ones. Usually, this problem is solved by exploiting personal experience but the number of factors to be considered is so large that the output may be not objective and cannot be easily communicated. We propose a methodology that tackles the “risk with no data” problem by predicting the behavior of intelligent attackers against the system to be assessed. These attacker are intelligent and they minimize their efforts to control some predefined modules, their goal. It defines and executes the computer models of the system and those of the attackers to discover which agents reach their goals and how. The methodology handles randomness through a Monte Carlo method and it returns a sample it builds by collecting data in multiple executions. The target system is modeled as a set of interconnected modules. The operations that a module defines are invoked by the modules that own the corresponding privileges. The module vulnerabilities enable some attacks, e.g. an action that returns some privileges an agent is not entitled to. An attack succeeds with a probability that depends on both the agent and further system properties. The model of an attacker describes goals, legal privileges, available information on the system and how it selects attack chains. An attacker exploits attack chains because one cannot reach a goal. A detailed modeling of chain selection influences the model accuracy. The methodology is supported by the Haruspex suite, a set of tools to automate risk assessment and management. The suite tools build the models of interest, execute these models to produce a sample and use it to assess the risk and discover the most effective security investment. Besides describing the framework and suite, we will present some assessments that have adopted and validated the suite.

A formal approach to automatically assess and manage ICT risk

2017

Abstract

Risk has to be assessed and managed with no historical data anytime we adopt a new technology or a system that widely differs from the previous ones. Usually, this problem is solved by exploiting personal experience but the number of factors to be considered is so large that the output may be not objective and cannot be easily communicated. We propose a methodology that tackles the “risk with no data” problem by predicting the behavior of intelligent attackers against the system to be assessed. These attacker are intelligent and they minimize their efforts to control some predefined modules, their goal. It defines and executes the computer models of the system and those of the attackers to discover which agents reach their goals and how. The methodology handles randomness through a Monte Carlo method and it returns a sample it builds by collecting data in multiple executions. The target system is modeled as a set of interconnected modules. The operations that a module defines are invoked by the modules that own the corresponding privileges. The module vulnerabilities enable some attacks, e.g. an action that returns some privileges an agent is not entitled to. An attack succeeds with a probability that depends on both the agent and further system properties. The model of an attacker describes goals, legal privileges, available information on the system and how it selects attack chains. An attacker exploits attack chains because one cannot reach a goal. A detailed modeling of chain selection influences the model accuracy. The methodology is supported by the Haruspex suite, a set of tools to automate risk assessment and management. The suite tools build the models of interest, execute these models to produce a sample and use it to assess the risk and discover the most effective security investment. Besides describing the framework and suite, we will present some assessments that have adopted and validated the suite.
4-apr-2017
Italiano
Baiardi, Fabrizio
Università degli Studi di Pisa
File in questo prodotto:
File Dimensione Formato  
Attivita_Pubblicazioni.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 102.19 kB
Formato Adobe PDF
102.19 kB Adobe PDF Visualizza/Apri
Tesi_Tonelli.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 7.87 MB
Formato Adobe PDF
7.87 MB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14242/133880
Il codice NBN di questa tesi è URN:NBN:IT:UNIPI-133880