В. И. Булдыжов, аспирант
Ин-т проблем моделирования в энергетике
им. Г. Е. Пухова НАН Украины
(Украина, 03164, Киев-164, ул. Генерала Наумова, 15,
тел. (044) 4249903, e-mail:
АНОТАЦІЯ
Запропоновано новий підхід до побудови кількісного оцінювання рівня ризику безпеки інформації. Обґрунтовано можливість та коректність використання електротехнічних аналогій для розв'язання задач моделювання таких ризиків.
КЛЮЧОВІ СЛОВА:
управление рисками, уязвимости нулевого дня, сопротивление атаке.
ПОСИЛАННЯ
1. Stephenson P. Using formal methods for forensic analysis of intrusion events – a preliminary examination. [Электронный ресурс]—Режим доступа: http://www.imfgroup.com/Document Library.html.
2. Amenaza. A Quick Tour of Attack Tree Based Risk Analysis Using. [Электронный ресурс]— Режим доступа::http://www.amenaza.com.
3. Cuppens F. Alert Correlation in a Cooperative Intrusion Detection Framework // Proc. of the 2002 IEEE Symposium on Security and Privacy, 2002. [Электронный ресурс] — Режим доступа:http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.103.8332&rep=rep1&type=pdf.
4. Camtepe S., Yener B. A Formal Method for Attack Modeling and Detection. [Электронный ресурс] — Режим доступа: http://cs.rpi.edu/research/pdf/06-01.pdf.
5. Danforth M. Models for Threat Assessment in Networks. [Электронный ресурс]—Режим доступа: http://www.cs.ucdavis.edu/research/tech-reports/2006/CSE-2006-13.pdf.
6. Jajodia S., Noel S. Managing Attack Graph Complexity Through Visual Hierarchical Aggregation // In 1st Intern. Workshop on Visualization and Data Mining for Computer Security, Washington, DC, 2004.— P. 109—118.
7. The Systems Security Engineering Capability Maturity Model. [Электронный ресурс] — Режим доступа: http://www.ssecmm.org/index.html.
8. Swanson M., Bartol N., Sabato J. et al. Security Metrics Guide for Information Technology Systems. Special Publication 800-55.— National Institute of Standards and Technology. July, 2003. [Электронный ресурс] — Режим доступа: http://www.rootsecure.net/content/downloads/pdf/nist_security_metrics_guide.pdf.
9. Stoneburner G., Hayden C., Feringa A. Engineering Principles for Information Technology Security. Special Publication 800-27 (Rev A).— National Institute of Standards and Technology. June, 2004. [Электронный ресурс] — Режим доступа: http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf.
10. Chew E., Swanson M., Stine K. et al. NIST Special Publication 800-55. Revision 1.Performance Measurement Guide for Information Security. July, 2008. [Электронный ресурс]—Режим доступа: http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf.
11. Stoneburner G., Goguen A., Feringa A. NIST Special Publication 800-30: Risk Management Guide for Information Technology Systems. March, 2001. [Электронный ресурс] —Режим доступа: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.
12. Mell P., Scarforne K., Romanosky S. A Complete Guide to the Common Vulnerability Scoring System (CVSS). Version 2.0. [Электронный ресурс] — Режим доступа:http://www.first.org/cvss/cvss-guide.html.
13. Ritchey R., Ammann P. Using Model Checking to Analyze Network Vulnerabilities // Proc. IEEE Symposium on Security and Privacy.— 2000. [Электронный ресурс]—Режим доступа:http://www.cs.washington.edu/research/projects/poirot3/Oakland/sp/PAPERS/0007_17.PDF.
14. Sheyner O., Haines J., Jha S. et al. Automated Generation and Analysis of Attack Graphs//Ibid.— 2002. [Электронный ресурс] — Режим доступа: http://wiki.cac.washington.edu/download/attachments/10000785/Automated+Generation+and+Analysis+of+Attack+Graphs.pdf.
15. Ammann P., Wijesekera D., Kaushik S. Scalable, Graph-Based Network Vulnerability Analysis//Proc. Conf. on Computer and Communications Security.— 2002. [Электронный ресурс] — Режим доступа: http://mason.gmu.edu/~skaushik/index_files/p160-ammann.pdf.
16. Lippmann R., Ingols K., Scott C. et al. Validating and Restoring Defense in Depth Using Attack Graphs // MILCOM Military Communications Conference, 2006. [Электронный ресурс] — Режим доступа: http://www.ll.mit.edu/mission/communications/ist/publications/061023_Lippmann.pdf.
17. Noel S., Jajodia J. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices//Proc. 21st Annual Computer Security Applications Conf., 2005. [Электронный ресурс] — Режим доступа: http://www.acsac.org/2005/papers/87.pdf.
18. Noel S., Jajodia S. Managing Attack Graph Complexity through Visual Hierarchical Aggregation// Proc. ACM CCS Workshop on Visualization and Data Mining for Computer Security, 2004. [Электронный ресурс] — Режим доступа: http://csis.gmu.edu/noel/pubs/2004_VizSec.pdf.
19. Noel S., Jajodia S. Advanced Vulnerability Analysis and Intrusion Detection through Predictive Attack Graphs//Critical Issues in C4I, Armed Forces Communications and Electronics Association (AFCEA) Solutions Series, 2009. [Электронный ресурс] — Режим доступа:http://csis.gmu.edu/noel/pubs/2009_c4i.pdf.
20. Noel S., Jajodia S. Proactive Intrusion Prevention and Response via Attack Graphs// Practical Intrusion Detection. Ed. by Ryan Trost. — Addison-Wesley Professional (in preparation). [Электронный ресурс] — Режим доступа: http://csis.gmu.edu/noel/pubs/ 2008_IDS_chapter.pdf.
21. Cuppens F., Ortalo R. LAMBDA: A Language to Model a Database for Detection of Attacks//Proc. on Recent Advances in Intrusion Detection, 2000.— Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs. [Электронный ресурс]—Режим доступа: http://www.springerlink.com/content/4yru642m1f354fdv/.
22. Templeton, Levitt K. A Requires/Provides Model for Computer Attacks// Proc. New Security Paradigms Workshop, 2000. [Электронный ресурс] — Режим доступа: http://seclab.cs.ucdavis.edu/ papers/NP2000-rev.pdf.
23. Ritchey R., O'Berry B., Noel S. Representing TCP/IP Connectivity for Topological Analysis of Network Security//Proc. 18th Annual Computer Security Applications Conf., 2002.
24. Skybox Security. [Электронный ресурс]—Режим доступа: http://www.skyboxsecurity.com/.
25. RedSeal Systems. [Электронный ресурс]— Режим доступа: http://www.redseal.net/.
26. Lippmann R., Ingols K. An Annotated Review of Past Papers on Attack Graphs.— Lincoln
Laboratory Technical Report ESC-TR-2005-054.— 2005.
27. Frigault M., Wang L., Singhal A., Jajodia S. Measuring Network Security Using Dynamic Bayesian Network//2008 ACMWorkshop on Quality of Protection. October 2008. [Электронный ресурс]—Режим доступа: http://csrc.nist.gov/staff/Singhal/qop2008_DBN_paper.pdf.
28. Wang L., Singhal A., Jajodia S. Measuring the Overall Security of Network Configurations using Attack Graphs// Proc. 21st IFIP WG 11.3 Working Conference on Data and Applications Security.— Springer-Verlag, 2007.
29. Pamula J., Jajodia S., Ammann P., Swarup V. A Weakest-Adversary Security Metric for Network Configuration Security Analysis//Proc. 2nd ACM Workshop on Quality of Protection, ACM Press, 2006. [Электронный ресурс]—Режим доступа: http://dl.acm.org/citation.cfm?id=1179502.
30. Wang L., Islam T., Long T. et al. An Attack Graph Based Probabilistic Security Metrics//Proc. 22nd IFIP WG 11.3 Working Conference on Data and Application Security (DBSEC 2008).— London, 2008. [Электронный ресурс] — Режим доступа: http://www.nist.gov/itl/csd/singhal-anoop.cfm.
31. Singhal A., Xou S. Techniques for Enterprise Network Security Metrics// Proc. 2009 Cyber Security and Information Intelligence Research Workshop.— Oakridge National Labs, 2009. [Электронный ресурс] — Режим доступа: http://www.csiir.ornl.gov/csiirw/09/CSIIRW09-Proceedings/Abstracts/Singhal_abstract.pdf.
32. Manadhata P., Wing J., Flynn M., McQueen M. Measuring the attack surface of two FTP daemons//Proc. 2nd ACM Workshop on Quality of Protection, 2006. [Электронный ресурс] — Режим доступа: http://www.cs.cmu.edu/~pratyus/qop.pdf.
33. Ou X., Govindavajhala S., Appel A.W. MulVAL: A logic-based network security analyzer // The 14th USENIX Security Symposium, Baltimore, MD, USA, 2005. [Электронный ресурс] — Режим доступа: http://www.cis.ksu.Edu/~xou/publications/mulval_sec05.pdf.
БУЛДЫЖОВ Владимир Иванович, аспирант Ин-та проблем моделирования в энергетике им. Г. Е. Пухова НАН Украины. В 2000 г. окончил Украинский государственный морской технический университет (г. Николаев). Область научных исследований — управление информационной безопасностью и рисками.