Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders,...

48
Simulation-based optimization of IT security controls Initial experiences with meta-heuristic solution procedures Elmar Kiesling, Andreas Ekelhart, Bernhard Grill, Christine Strauß, Christian Stummer 14 th EU/ME Workshop February 28 – March 1, 2013; Hamburg, Germany Funded by the Austrian Science Fund under project number P 23122-N23

Transcript of Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders,...

Page 1: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

Simulation-based optimizationof IT security controls

Initial experiences with meta-heuristic solution procedures

Elmar Kiesling, Andreas Ekelhart, Bernhard Grill,Christine Strauß, Christian Stummer

14th EU/ME WorkshopFebruary 28 – March 1, 2013; Hamburg, Germany

Funded by the Austrian Science Fund under project number P 23122-N23

Page 2: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Agenda

Introduction

FrameworkOverviewKnowledge baseAttack patternsSimulationOptimization

Example scenariosSimpleAdvanced

Conclusions

Page 3: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

3 Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

IntroductionCurrent IT security management challenges

I Information systems are growing ever more complex

I Today’s serious threats are not opportunistic, butI deliberate, targeted attacksI that exploit multiple attack vectors

Isoftware vulnerabilities

Inetwork vulnerabilities

Iinsider knowledge and access

Isocial engineering techniques

I. . .

I Human threat agents are heterogeneoushacktivists, script kiddies, insiders, advanced persistent threats . . .

æ “secure against whom?”

Page 4: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

3 Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

IntroductionCurrent IT security management challenges

I Information systems are growing ever more complex

I Today’s serious threats are not opportunistic, butI deliberate, targeted attacksI that exploit multiple attack vectors

Isoftware vulnerabilities

Inetwork vulnerabilities

Iinsider knowledge and access

Isocial engineering techniques

I. . .

I Human threat agents are heterogeneoushacktivists, script kiddies, insiders, advanced persistent threats . . .

æ “secure against whom?”

Page 5: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

3 Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

IntroductionCurrent IT security management challenges

I Information systems are growing ever more complex

I Today’s serious threats are not opportunistic, butI deliberate, targeted attacksI that exploit multiple attack vectors

Isoftware vulnerabilities

Inetwork vulnerabilities

Iinsider knowledge and access

Isocial engineering techniques

I. . .

I Human threat agents are heterogeneoushacktivists, script kiddies, insiders, advanced persistent threats . . .

æ “secure against whom?”

Page 6: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

3 Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

IntroductionCurrent IT security management challenges

I Information systems are growing ever more complex

I Today’s serious threats are not opportunistic, butI deliberate, targeted attacksI that exploit multiple attack vectors

Isoftware vulnerabilities

Inetwork vulnerabilities

Iinsider knowledge and access

Isocial engineering techniques

I. . .

I Human threat agents are heterogeneoushacktivists, script kiddies, insiders, advanced persistent threats . . .

æ “secure against whom?”

Page 7: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

4 Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

IntroductionCore ideas

Security:I is meaningless without defining “against whom”I is the result of the combined e�ect of all

implemented security controlsI involves tradeo�s between multiple monetary and

non-monetary criteria

No universally “best" solution:Highly context-dependent, decisions must consider

1. “system” characteristics(physical and IT infrastructure, people etc.)

2. the threat model3. available resources4. decision-makers’ risk preferences

Page 8: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

4 Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

IntroductionCore ideas

Security:I is meaningless without defining “against whom”I is the result of the combined e�ect of all

implemented security controlsI involves tradeo�s between multiple monetary and

non-monetary criteria

No universally “best" solution:Highly context-dependent, decisions must consider

1. “system” characteristics(physical and IT infrastructure, people etc.)

2. the threat model3. available resources4. decision-makers’ risk preferences

Page 9: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

Framework5 Overview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Objective: choose an “optimal" set of security controls

Approach:1. Model

I abstract causal structures (attack actions)I attack agent behaviorI context (assets, employees . . . )

2. Apply control sets and simulating attacks3. Identify e�cient sets of controls through

multi-criteria optimization

Page 10: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

Framework6 Overview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Implem

entation cost

Successful attacks

Detected attacks

Running cost

Implem

entation time

Successful attack actions

Metaheuristic optimization1 1 1 0 0 0 0 1 0 0 1 1

Attack Simulation Engine

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 11: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

7 Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Implem

entation cost

Successful attacks

Detected attacks

Running cost

Implem

entation time

Successful attack actions

Metaheuristic optimization1 1 1 0 0 0 0 1 0 0 1 1

Attack Simulation Engine

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 12: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

8 Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkKnowledge base

I Abstract attack knowledge (causal structure)+ system structure knowledge

I Initial experiments with OWL ontologiesI Current rule-based implementation: SWI-Prolog1

1http://www.swi-prolog.org/man/clpfd.html

Page 13: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

8 Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkKnowledge base

Page 14: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

9 Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 15: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

10 Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkAttack pattern linking

Page 16: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

10 Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkAttack pattern linking

+

Page 17: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

10 Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkAttack pattern linking

+

Page 18: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

10 Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkAttack pattern linking

Page 19: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

11 Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkAttack pattern linking

Page 20: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

12 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 21: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

13 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 22: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

13 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Attack Simulation Engine

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 23: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

14 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

SimulationDiscrete Event Scheduling

Action StartEvent

...

t=0

Action Selection

Page 24: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

14 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

SimulationDiscrete Event Scheduling

Action StartEvent

...

t=0

Action Selection

Action EndEvent

ActionExecution

Page 25: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

14 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

SimulationDiscrete Event Scheduling

Action StartEvent

...

t=0

Action Selection

Action EndEvent

ActionExecution

Target Reached

Event

Execution Result

ActionSelection

Action StartEvent

Action EndEvent

... Action EndEvent

Page 26: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

14 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

SimulationDiscrete Event Scheduling

Action StartEvent

...

t=0

Action Selection

DetectionEvent Response

Attacker Stopped

Event

Action EndEvent

ActionExecution

Target Reached

Event

Execution Result

ActionSelection

Action StartEvent

Action EndEvent

... Action EndEvent

Page 27: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

15 Simulation

Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

SimulationExample attack sequence

Page 28: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

16 Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Attack Simulation Engine

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 29: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

16 Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Metaheuristic optimization1 1 1 0 0 0 0 1 0 0 1 1

Attack Simulation Engine

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 30: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

16 Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

FrameworkOverview

Implem

entation cost

Successful attacks

Detected attacks

Running cost

Implem

entation time

Successful attack actions

Metaheuristic optimization1 1 1 0 0 0 0 1 0 0 1 1

Attack Simulation Engine

Attack Scenario

Attackermodel

AbstractAttack Graph

Attackerobjectives

Attack PatternLinking

Knowledge base

Attack and ControlModel

System Model

Page 31: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

17 Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

OptimizationOpt4j-based implementation

Optimizer Operator Genotype Creator

DecoderPhenotype

Evaluator

IndividualPopulation

Archive Objectives

updates

updates

uses varies creates

uses

decodes

uses

evaluates

contains

contains

updates contains

Source: adapted from ?

Page 32: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

17 Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

OptimizationOpt4j-based implementation

Optimizer Operator CandidateControlMapGenotype

CandidateControlMapGenotypeCreator

CandidateControlMapGenotypeDecoder

MosesEvaluator

IndividualPopulation

Archive Objectives

updates

updates

uses varies creates

uses

decodes

uses

evaluates

contains

contains

updates containsInitializedSystemPhenotype

Source: adapted from ?

Page 33: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

18 Optimization

ExamplescenariosSimple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

OptimizationEvaluation of candidate control portfolios

CandidateControlMapGenotype

MosesEvaluator

1 1 1 0 0 0 0 1 0 0 1 1

InitializedSystemPhenotype

I Probabilistic, requires many replications percandidate control set

I Currently reduced to a deterministic problem usingexpected/median/worst case values etc.

Page 34: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

19 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Simple ScenarioDomain

Worksta(ons

Database-servers

External-network

A4acker

Internet

A4ack-client

Users-&-Groups

Administrators

Users

Client-1

Client-3

Data1 Data2

DB1 DB2---

Emp-4

Emp-1

Emp-3

Client-2--Emp-2

Page 35: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

19 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Simple ScenarioDomain

Worksta(ons

Database-servers

External-network

A4acker

Internet

A4ack-client

Users-&-Groups

Administrators

Users

Client-1

Client-3

Data1 Data2

DB1 DB2---

Emp-4

Emp-1

Emp-3

Client-2--Emp-2

An(virus-1 Intrusion-detec(on-system-1Intrusion-detec(on-system-2 Security-TrainingTIDS2

AV1

An(virus-2Patch-CVE_04_22P

AV2

IDS1

Page 36: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

19 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Simple ScenarioDomain

Worksta(ons

Database-servers

External-network

A4acker

Internet

A4ack-client

Users-&-Groups

Administrators

Users

Client-1

Client-3

Data1 Data2

DB1 DB2---

Emp-4

Emp-1

Emp-3

Client-2--Emp-2

An(virus-1 Intrusion-detec(on-system-1Intrusion-detec(on-system-2 Security-TrainingTIDS2

AV1

An(virus-2Patch-CVE_04_22P

AV2

IDS1

Page 37: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

20 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Simple ScenarioDecision variables and objectives

Decision space: 12 binary variables

Objectives:1. Cost (MIN)2. Successful attack actions ratio (MIN)3. Target condition reached average (MIN)4. Share of undetected detectable attack actions

(MIN)

Attacker objective: access Data1 on DB1

Page 38: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

21 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Simple scenarioAlgorithms and parameter settings

Simulation parametersI 50 replications per candidate setI Random “drill-down” decision model

Optimization parameters (NSGA2 and SPEA2)I Generations: 100I Population size (–): 100I Number of parents per generation (µ): 25I Number of o�springs per generation (⁄): 25I Crossover:

I Rate: 0.95I Single crossover point

I Mutation: constant rate 0.05

Page 39: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

22 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Initial ResultsSimple scenario

Runtime (search space: 212)I per replication: ≥ 25ms (3GHz DualCore Xeon)I per evaluation: ≥ 1, 250ms (50 replications)I total: CE: 183min, NSGA2: 61min, SPEA2: 70min

E�cient solutions:

Page 40: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

23 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Initial ResultsSimple scenario

Q4(A)= 1|CE |

qrœCE

minzœA

D(z,r)

Page 41: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

Examplescenarios

24 Simple

Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Simple scenarioExample e�cient solution

Worksta(ons

Database-servers

External-network

A4acker

Internet

A4ack-client

Users-&-Groups

Administrators

Users

Client-1

Client-3

Data1 Data2

DB1 DB2---

Emp-4

Emp-1

Emp-3

Client-2--Emp-2

An(virus-1 Intrusion-detec(on-system-1Intrusion-detec(on-system-2 Security-TrainingTIDS2

AV1

An(virus-2Patch-CVE_04_22P

AV2

IDS1

T

T

P

IDS2

AV1

IDS1

Cost 22.400Successful attack actions ratio 0.000558Target condition reached average 0.018519Share of undetected detectable attack actions 0.083333

Page 42: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

25 Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Advanced ScenarioDomain

Servers

DMZ

DMZ)hosts)(5)

ClientsExternal)network

A:acker

Internet

.".".

Users)&)Groups

workstaBon)hosts)(30)

A:ack)client

workstaBon)user)group)(30)

file)server)admin)group)(2)

admingroup)(3)

db)admin)group)(3)

Subnet1

DB)servers)(5)

Data1 Data2 Data3subnet1)user)group)(20)

file)server)reader)group)(5)

file)servers)(5)

Page 43: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

25 Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Advanced ScenarioDomain

Servers

DMZ

DMZ)hosts)(5)

ClientsExternal)network

A:acker

Internet

.".".

Users)&)Groups

workstaBon)hosts)(30)

A:ack)client

workstaBon)user)group)(30)

file)server)admin)group)(2)

admingroup)(3)

db)admin)group)(3)

Subnet1

DB)servers)(5)

Data1 Data2 Data3subnet1)user)group)(20)

file)server)reader)group)(5)

file)servers)(5)

AnBvirus)1 Intrusion)detecBon)system)1

Intrusion)detecBon)system)2Security)Training

1

2

1Applied"controls:

AnBvirus)22

Patch)CVE_2013_04_22P

Logging)Policy1

12

23

Page 44: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

26 Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Advanced ScenarioAlgorithms and parameter settings

Simulation parametersI 50 replications per candidate setI Random “drill-down” decision model

Optimization parameters (NSGA2 and SPEA2)I Generations: 400I Population size (–): 100I Number of parents per generation (µ): 25I Number of o�springs per generation (⁄): 25I Crossover:

I Rate: 0.95I Single crossover point

I Mutation: constant rate 0.05

Page 45: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

27 Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Initial ResultsAdvanced scenario

RuntimeI per replication ≥ 30ms (3GHz DualCore Xeon)I total: ≥ 4 : 30h

Proposed e�cient solutions

Page 46: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

28 Advanced

Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Advanced ScenarioDomain

Servers

DMZ

DMZ)hosts)(5)

ClientsExternal)network

A:acker

Internet

.".".

Users)&)Groups

workstaBon)hosts)(30)

A:ack)client

workstaBon)user)group)(30)

file)server)admin)group)(2)

admingroup)(3)

db)admin)group)(3)

Subnet1

DB)servers)(5)

Data1 Data2 Data3subnet1)user)group)(20)

file)server)reader)group)(5)

file)servers)(5)

AnBvirus)1 Intrusion)detecBon)system)1

Intrusion)detecBon)system)2Security)Training

1

2

1Applied"controls:

AnBvirus)22

Patch)CVE_2013_04_22P

Logging)Policy1

12

23

2

2

2

1

2

1

P

P

11

1

3

1

2

Cost 15.330Successful attack actions ratio 0.0185Target condition reached average 0.0Share of undetected detectable attack actions 0.0093

Page 47: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

29 Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

ConclusionsOutlook

Current research challengesI Simulation:

I Cognitive and behavioral modelI Optimization:

I Computational cost for individual portfolioevaluations

I Uncertainty of simulationI Thorough testing of optimization algorithms

(more alogrithms, performance measures acrossmultiple runs, multiple problem instances etc.)

Ideas for future workI Probabilistic dominance concepts?I Assign replications non-uniformly?I Control selection æ system design

(very large design space + constraints)

Page 48: Simulation-based optimization of IT security controls · hacktivists, script kiddies, insiders, advanced persistent threats ... æ “secure against whom?” 32 3 Introduction Framework

32

Introduction

FrameworkOverview

Knowledge base

Attack patterns

Simulation

Optimization

ExamplescenariosSimple

Advanced

30 Conclusions

EU/ME 2013 - Simulation-based optimization of IT security controls

Q & A

Contact:[email protected]