Self-protection is a desired property of many modern ICT systems as it enriches them in detecting and reacting to security threats at run-time. Several solutions leveraging vulnerability scanners and attack graphs have recently been proposed to monitor and analyze cyber risks and trigger security adaptations accordingly. They mainly focus on the system design without investigating the potential drawbacks of their components, such as accuracy and scalability. This paper investigates the accuracy of the environment monitoring, the scalability of the security analysis, and their intrinsic relationships. To balance their trade-off, we contribute a computational pipeline that includes vulnerability filtering and aggregation modules that can be used in isolation or combined to tune the monitoring and analysis of Attack Graph-based self-protecting systems. We propose different heuristics for filtering and aggregation, each impacting the accuracy-scalability trade-off at various levels, and we assess their interplay in a real-setting scenario.

Improving Attack Graph-based Self-Protecting Systems: A Computational Pipeline for Accuracy-Scalability Trade-off / Bonomi, Silvia; Cuoci, Marco; Lenti, Simone; Palma, Alessandro. - 15456:(2024), pp. 525-542. ( 19th International Conference on Risks and Security of Inter￾net and Systems (CRiSIS) 2024 Aix-En-Provence, France ) [10.1007/978-3-031-89350-6_33].

Improving Attack Graph-based Self-Protecting Systems: A Computational Pipeline for Accuracy-Scalability Trade-off

Silvia Bonomi
;
Marco Cuoci
;
Simone Lenti
;
Alessandro Palma
2024

Abstract

Self-protection is a desired property of many modern ICT systems as it enriches them in detecting and reacting to security threats at run-time. Several solutions leveraging vulnerability scanners and attack graphs have recently been proposed to monitor and analyze cyber risks and trigger security adaptations accordingly. They mainly focus on the system design without investigating the potential drawbacks of their components, such as accuracy and scalability. This paper investigates the accuracy of the environment monitoring, the scalability of the security analysis, and their intrinsic relationships. To balance their trade-off, we contribute a computational pipeline that includes vulnerability filtering and aggregation modules that can be used in isolation or combined to tune the monitoring and analysis of Attack Graph-based self-protecting systems. We propose different heuristics for filtering and aggregation, each impacting the accuracy-scalability trade-off at various levels, and we assess their interplay in a real-setting scenario.
2024
19th International Conference on Risks and Security of Inter￾net and Systems (CRiSIS) 2024
Self-Protecting Systems; Attack Graph; Risk Estimation; Risk Accuracy; Scalability
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Improving Attack Graph-based Self-Protecting Systems: A Computational Pipeline for Accuracy-Scalability Trade-off / Bonomi, Silvia; Cuoci, Marco; Lenti, Simone; Palma, Alessandro. - 15456:(2024), pp. 525-542. ( 19th International Conference on Risks and Security of Inter￾net and Systems (CRiSIS) 2024 Aix-En-Provence, France ) [10.1007/978-3-031-89350-6_33].
File allegati a questo prodotto
File Dimensione Formato  
Bonomi__Improving_2025.pdf

accesso aperto

Note: Full text acceptedhttps://doi.org/10.1007/978-3-031-89350-6_33
Tipologia: Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza: Creative commons
Dimensione 843.13 kB
Formato Adobe PDF
843.13 kB Adobe PDF

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1729836
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact