Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability Matrix
Abstract
:1. Introduction
2. Related Work
3. MRM2 Approach
3.1. Low-Level Diffusion Model Based on MRM
3.1.1. Creation of Primitive Matrix
3.1.2. Power of the Primitive Matrix
3.1.3. MRM-Based Analysis of the Diffusion Process
3.2. High-Level Abstraction for Strategic Decision Making
3.2.1. Relationship between Organization, System, and Host
3.2.2. Determination of Entry () and Exit Nodes () for Organization
3.2.3. Calculating the Depth of Transmission (DoT) to Identify the Extent of Diffusion between Organizations
- (i)
- The row vector connecting the entry nodes () and exit nodes () of the assets beloning to the described in the previous section as the output ( from the MRM (Figure 8c).
- (ii)
- According to Equation (6), can be obtained.
4. Interpreting Threat Alerts through MRM2
4.1. Calculating the Distance between the Entry Point and the Destination in Case of a Threat
4.2. Synthesize Multiple Intrusion Alerts within an Organization
4.3. Assessment and Action of Threats
4.4. Selecting the Optimal Point for Threat Avoidance
5. Experimental Scenario Design and Results
5.1. Pre-Construct Organizational and Topological Information
5.2. Threat-Scenario-Based Impact Analysis
Diffusion Impact Analysis for Primary Actions in Threat Alerts
5.3. Multi-Threat Assessment Considering Defensive Effectiveness
5.4. High-Level Abstraction for Strategic Decision Making
6. Discussion and Limitations
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. List of HOST and Network Topology
Layer | Group | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Company (1) | Company A | |||||||||||
2 | Department (3) | Management | Sales | Factory | |||||||||
3 | Team (8) | MGMT. | Purchase | Branch 1 | Branch 2 | Materials | Manufacturing | ||||||
4 | Subnet (12) | ||||||||||||
5 | Host (60) | ||||||||||||
6 | System (3) | MIS System | ERP System | MIS System | MIS System | ERP System | F.A system |
Host | Adjacency List | Host | Adjacency List |
---|---|---|---|
- | |||
- | - | ||
- | |||
- | |||
- | |||
- | |||
- | |||
- | - | ||
- | - | ||
Host() | 1 | 2 | TH |
---|---|---|---|
6 | 137 | 0.292 | |
6 | 137 | 0.292 | |
6 | 133 | 0.301 | |
5 | 106 | 0.377 | |
7 | 168 | 0.238 | |
7 | 168 | 0.238 | |
7 | 168 | 0.238 | |
7 | 168 | 0.238 | |
5 | 129 | 0.31 | |
4 | 105 | 0.381 | |
5 | 125 | 0.32 | |
5 | 122 | 0.328 | |
6 | 160 | 0.25 | |
6 | 160 | 0.25 | |
6 | 160 | 0.25 | |
6 | 160 | 0.25 | |
6 | 130 | 0.308 | |
7 | 161 | 0.248 | |
7 | 157 | 0.255 | |
7 | 161 | 0.248 | |
8 | 192 | 0.208 | |
8 | 192 | 0.208 | |
8 | 192 | 0.208 | |
8 | 192 | 0.208 | |
5 | 113 | 0.354 | |
6 | 145 | 0.276 | |
6 | 141 | 0.284 | |
6 | 145 | 0.276 | |
7 | 176 | 0.227 | |
7 | 176 | 0.227 | |
7 | 176 | 0.227 | |
7 | 176 | 0.227 | |
6 | 146 | 0.274 | |
7 | 177 | 0.226 | |
7 | 173 | 0.231 | |
7 | 177 | 0.226 | |
8 | 208 | 0.192 | |
8 | 208 | 0.192 | |
8 | 208 | 0.192 | |
8 | 208 | 0.192 | |
2 | 13 | 0.615 | |
2 | 13 | 0.615 | |
2 | 9 | 0.889 | |
2 | 13 | 0.615 | |
2 | 12 | 0.667 | |
2 | 12 | 0.667 | |
2 | 12 | 0.667 | |
2 | 12 | 0.667 |
Division | TS | ||
---|---|---|---|
Organization | Management | MGMT. | 2.214 |
Purchase | 2.339 | ||
Subtotal | 4.553 | ||
Salse | Branch1 | 1.893 | |
Branch2 | 2.098 | ||
Subtotal | 3.991 | ||
Factory | Purchase | 1.726 | |
Material | 5.402 | ||
Subtotal | 7.128 | ||
System | MIS | MGMT. | 2.214 |
Branch1 | 1.893 | ||
Branch2 | 2.098 | ||
Subtotal | 6.206 | ||
ERP | Purchase | 2.339 | |
Material | 1.726 | ||
Subtotal | 4.065 | ||
F.A | F.A | 5.402 |
References
- Kyle, I.; Lippmann, R.; Piwowarski, K. Practical attack graph generation for network defense. In Proceedings of the 2006 22nd Annual Computer Security Applications Conference (ACSAC’06), Miami Beach, FL, USA, 11–15 December 2006; pp. 121–130. [Google Scholar]
- Misra, S.; Obaidat, M.S.; Bagchi, A.; Bhatt, R.; Ghosh, S. Attack graph generation with infused fuzzy clustering. In Proceedings of the International Conference on Security and Cryptography, SCITEPRESS, Milan, Italy, 7–10 July 2009; Volume 1. [Google Scholar]
- Tao, L.; Chen, D.; Song, R. Measure large scale network security using adjacency matrix attack graphs. In Proceedings of the 2010 5th International Conference on Future Information Technology, Busan, Republic of Korea, 21–23 May 2010; pp. 1–8. [Google Scholar]
- Steven, N.; Jajodia, S. Understanding complex network attack graphs through clustered adjacency matrices. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC’05), Tucson, AZ, USA, 5–9 December 2005; pp. 10–169. [Google Scholar]
- Xie, A.; Tang, C.; Gui, N.; Cai, Z.; Hu, J.B.; Chen, Z. An adjacency matrixes-based model for network security analysis. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–8. [Google Scholar]
- Kim, K.-J.; Oh, S.-H.; Lee, D.-H.; Oh, H.-R.; Lee, J.-S.; Shin, D.-K. A research on cyber target importance ranking using PageRank algorithm. J. Korean Soc. Internet Inf. 2021, 22, 115–127. [Google Scholar]
- Kertzner, P.; Carter, C.; Hahn, A. Crown Jewels Anaysis: For Industrial Control Systems; MITRE: McLean, VA, USA, 2022. [Google Scholar]
- Lim, N.-K. A Study on Efficient Critical Cyber Asset Identification Methods for All Domain Operations. J. Mil. Sci. Res. 2023, 74, 127–147. [Google Scholar]
- Kim, A.; Kang, M.H.; Luo, J.Z.; Velasquez, A. A framework for event prioritization in cyber network defense. 2014. Available online: https://apps.dtic.mil/sti/citations/ADA608707 (accessed on 29 September 2024).
- Rodrigues, F.A. Network centrality: An introduction. In A Mathematical Modeling Approach from Nonlinear Dynamics to Complex Systems; Springer: Cham, Switzerland, 2019; pp. 177–196. [Google Scholar]
- Tripathy, A. Transitive Closure of a Graph using Graph Powering & further optimization by Euler’s Fast Powering Algorithm. Int. J. Sci. Res. 2021, 10, 869–873. [Google Scholar]
- Noel, S.; Jajodia, S. Managing attack graph complexity through visual hierarchical aggregation. In VizSEC/DMSEC ’04: Proceedings of the 2004 ACM workshop on Visualization and Data Mining for Computer Security; ACM Press: New York, NY, USA, 2004; pp. 109–118. [Google Scholar]
- Noel, S.; Jacobs, M.; Kalapa, P.; Jajodia, S. Multiple Coordinated Views for Network Attack Graphs. In Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), Minneapolis, MN, USA, 26 October 2005. [Google Scholar]
- Lippmann, R.; Williams, L.; Ingols, K. An Interactive Attack Graph Cascade and Reachability Display; IEEE Workshop on Visualization for Computer Security (VizSEC 2007); Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
- Homer, J.; Varikuti, A.; Ou, X.; McQueen, M.A. Improving Attack Graph Visualization through Data Reduction and Attack Grouping. In Proceedings of the International Workshop on Visualization for Computer Security, Cambridge, MA, USA, 15 September 2008; pp. 68–79. [Google Scholar]
- Milajerdi, S.M.; Gjomemo, R.; Eshete, B.; Sekar, R.; Venkatakrishnan, V.N. Holmes: Real-time apt detection through correlation of suspicious information flows. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019. [Google Scholar]
- Jang, J.; Kim, K.; Yoon, S.; Lee, S.; Ahn, M.; Shin, D. Mission impact analysis by measuring the effect on physical combat operations associated with cyber asset damage. IEEE Access 2023, 11, 45113–45128. [Google Scholar] [CrossRef]
- Musman, S.; Temin, A.; Tanner, M.; Fox, D.; Pridemore, B. Evaluatingthe Impact of Cyber Attacks on Missions. In Proceedings of the 5th International Conference of Information Warfare and Security, Dayton, OH, USA, 8–9 April 2010. [Google Scholar]
- Noel, S.; Ludwig, J.; Jain, P.; Johnson, D.; Thomas, R.K.; McFarland, J.; King, B.; Webster, S.; Tello, B. Analyzing mission impacts of cyber actions (AMICA). In Proceedings of the NATO IST-128 Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact, Istanbul, Turkey, 15–17 June 2015. [Google Scholar]
Contents of Works | Reference |
---|---|
An algorithm for calculating target criticality based on target connectivity, target importance, and target exposure based on the Page Rank Algorithm | [6] |
MITRE models the impact of state changes in cyber assets on achieving operational objectives to identify crown jewel mission systems that are critical to the execution of operations | [7] |
A method for calculating the contribution of a cyber asset to the achievement of operational objectives to understand its impact on operations | [8] |
A framework for quantifying host exposure, asset criticality, and events for hosts in a network to determine asset criticality based on the impacts of events on hosts | [9] |
Level | Group | Description | Remark |
---|---|---|---|
High-level | Organization | Organizational hierarchical relationship (i.e., company, department, team) | MRM2 |
System | According to the classification criteria of the organization’s business network (i.e., Management Information System, group ware, factory automation system) | ||
Low-level | Reachable Vector | Vector of connectivity and distance between hosts | |
Topology-layer | Subnet | Same subnet ID that the asset belongs to | Attack-Graph |
Host | According to asset classification criteria (including what the host owns, i.e., vulnerabilities, software, contents, etc.) |
1 | 2 | TH | TS | |
---|---|---|---|---|
4 | 27 | 0.423 | 4.786 | |
5 | 37 | 0.305 | ||
4 | 28 | 0.407 | ||
4 | 28 | 0.407 | ||
4 | 28 | 0.407 | ||
3 | 22 | 0.524 | ||
3 | 22 | 0.478 | ||
4 | 24 | 0.367 | ||
5 | 31 | 0.367 | ||
5 | 31 | 0.367 | ||
5 | 31 | 0.367 | ||
5 | 31 | 0.367 | ||
1 | 3 | 0.666 | 1.998 | |
1 | 3 | 0.666 | ||
1 | 3 | 0.666 |
MRM Matrix | Box-and-Whisker Diagram | |||
---|---|---|---|---|
Threat host | ||||
Number of hosts | 40 | 39 | ||
7(8) | 6(7) | |||
Min | 4 | 4 | ||
Ave | 6.58 | 5.74 | ||
StDev | 1.03 | 0.82 | ||
Min | 105 | 94 | ||
Ave | 160.9 | 138.87 | ||
StDev | 28.10 | 21.87 | ||
View Details | Figure A2 | Figure A3 |
Hop | Affected Host ID | Affected System 1 | |||||||
---|---|---|---|---|---|---|---|---|---|
Impact | MIS System | ERP System | Total 2 | ||||||
MGMT. | Salse | MGMT. | Factory | ||||||
MIS | Branch 1 | Branch 2 | Purchase | Material | |||||
0 | 27 | 37 | 0/8 | 0/8 | 1/8 | 0/8 | 1/8 | 2/40 | |
1 | 25, 26, 28, 29, 30, 31, 32 | 35, 38, 39, 40 | 0/8 | 0/8 | 8/8 | 0/8 | 5/8 | 13/40 | |
2 | 4, 10 | 33, 34, 36 | 1/8 | 0/8 | 8/8 | 1/8 | 8/8 | 18/40 | |
3 | 1, 2, 3, 9, 11, 12, 13, 17 | 12 | 4/8 | 1/8 | 8/8 | 4/8 | 8/8 | 25/40 | |
4 | 5, 6, 7, 8, 18, 19, 20 | 13, 14, 15, 16 | 8/8 | 4/8 | 8/8 | 8/8 | 8/8 | 36/40 | |
5 | 21, 22, 23, 24 | - | 8/8 | 8/8 | 8/8 | 8/8 | 8/8 | 40/40 | |
MRM | Number of Hosts | |||||||
---|---|---|---|---|---|---|---|---|
Min | Ave | StDev | Min | Ave | StDev | |||
40 | 7(8) | 4 | 6.58 | 1.03 | 105 | 160.9 | 28.10 | |
38 | 5(6) | 3 | 4.87 | 0.78 | 72 | 123.63 | 21.36 | |
39 | 6(7) | 4 | 5.85 | 0.99 | 88 | 147.31 | 21.30 | |
39 | 5(6) | 3 | 5.00 | 0.83 | 81 | 133.44 | 22.84 | |
39 | 5(6) | 3 | 5.00 | 0.83 | 81 | 133.44 | 22.84 | |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, J.; Jung, S.; Cheagal, D.; Jang, J.; Shin, D. Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability Matrix. Electronics 2024, 13, 3921. https://doi.org/10.3390/electronics13193921
Lee J, Jung S, Cheagal D, Jang J, Shin D. Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability Matrix. Electronics. 2024; 13(19):3921. https://doi.org/10.3390/electronics13193921
Chicago/Turabian StyleLee, Jina, Subong Jung, Daehoon Cheagal, Jisoo Jang, and Dongkyoo Shin. 2024. "Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability Matrix" Electronics 13, no. 19: 3921. https://doi.org/10.3390/electronics13193921
APA StyleLee, J., Jung, S., Cheagal, D., Jang, J., & Shin, D. (2024). Study on Prediction and Response Model for Threat Diffusion Based on Multi-Step Reachability Matrix. Electronics, 13(19), 3921. https://doi.org/10.3390/electronics13193921