Repository logo
  • Log In
    Log in via Symplectic to deposit your publication(s).
Repository logo
  • Communities & Collections
  • Research Outputs
  • Statistics
  • Log In
    Log in via Symplectic to deposit your publication(s).
  1. Home
  2. Faculty of Engineering
  3. Computing
  4. Computing
  5. Efficient numerical frameworks for multi-objective cyber security planning
 
  • Details
Efficient numerical frameworks for multi-objective cyber security planning
OA Location
https://qmro.qmul.ac.uk/xmlui/handle/123456789/13487
Author(s)
Khouzani, MHR
Malacaria, P
Hankin, C
Fielder, A
Smeraldi, F
Type
Conference Paper
Abstract
We consider the problem of optimal investment in cyber-security by an enterprise. Optimality is measured with respect to the overall (1) monetary cost of implementation, (2) negative side-effects of cyber-security controls (indirect costs), and (3) mitigation of the cyber-security risk. We consider “passive” and “reactive” threats, the former representing the case where attack attempts are independent of the defender’s plan, the latter, where attackers can adapt and react to an implemented cyber-security defense. Moreover, we model in three different ways the combined effect of multiple cyber-security controls, depending on their degree of complementarity and correlation. We also consider multi-stage attacks and the potential correlations in the success of different stages. First, we formalize the problem as a non-linear multi-objective integer programming. We then convert them into Mixed Integer Linear Programs (MILP) that very efficiently solve for the exact Pareto-optimal solutions even when the number of available controls is large. In our case study, we consider 27 of the most typical security controls, each with multiple intensity levels of implementation, and 37 common vulnerabilities facing a typical SME. We compare our findings against expert-recommended critical controls. We then investigate the effect of the security models on the resulting optimal plan and contrast the merits of different security metrics. In particular, we show the superior robustness of the security measures based on the “reactive” threat model, and the significance of the hitherto overlooked role of correlations.
Editor(s)
Askoxylakis, I
Ioannidis, S
Katsikas, S
Meadows, C
Date Issued
2016-09-15
Date Acceptance
2016-09-01
Citation
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879, pp.179-197
URI
http://hdl.handle.net/10044/1/64565
DOI
https://www.dx.doi.org/10.1007/978-3-319-45741-3_10
ISBN
978-3-319-45740-6
ISSN
0302-9743
Publisher
Springer International Publishing AG
Start Page
179
End Page
197
Journal / Book Title
COMPUTER SECURITY - ESORICS 2016, PT II
Volume
9879
Sponsor
Engineering & Physical Science Research Council (EPSRC)
Identifier
http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000387954500010&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=1ba7043ffcc86c417c072aa74d649202
Grant Number
EP/K005790/1
Source
21st European Symposium on Research in Computer Security (ESORICS)
Subjects
Science & Technology
Technology
Computer Science, Information Systems
Computer Science, Theory & Methods
Computer Science
OPTIMIZATION
Publication Status
Published
Start Date
2016-09-26
Finish Date
2016-09-30
Coverage Spatial
Heraklion, Greece
Date Publish Online
2016-09-15
About
Spiral Depositing with Spiral Publishing with Spiral Symplectic
Contact us
Open access team Report an issue
Other Services
Scholarly Communications Library Services
logo

Imperial College London

South Kensington Campus

London SW7 2AZ, UK

tel: +44 (0)20 7589 5111

Accessibility Modern slavery statement Cookie Policy

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback