Abstract
As the SCADA system develops continuously, the dissemination of malicious network behaviors has brought great risk to the normal operation of enterprises, meanwhile resulting in huge economic burden to personal work and life. Therefore, the security reinforcement strategy is crucial to the field of network security management and analysis of the SCADA system. Some researchers have started to investigate on how to minimize the cost of realizing the SCADA system reinforcement strategy. However, the SCADA system administrators are facing a very challenging problem, that’s the reinforcement budget is less than the minimal input of SCADA system security reinforcement. The core of this problem lies on how to choose a subset from massive security reinforcement strategies, so as to minimize the risks from not patching all essential security vulnerabilities within the budget. Based on a deep comparative analysis of existing multi-objective optimization technologies, this paper proposes a multi-objective optimization method based on system attack tree model, and uses Pareto algorithm to solve this problem. The experimental results demonstrate that the Pareto algorithm can effectively make the multi-objective decision in security reinforcement strategy, and can solve practical issues in actual SCADA system security reinforcement practice.
Introduction
At present, the network-based computer system has become an important component of any information technology infrastructure, and the interconnection between each system is beneficial to inter-organization information exchange, which reduces the waiting time of information transfer and promotes the total system throughput. Since the service capability of an organization increasingly depends on the network-based computing system, it has become an essential need to maintain the accessibility to system resources. Therefore, any network malfunction resulted from system vulnerability directly affects the management cost of an organization. On the contrary, the organization should consider not only using the advantage of network system but also the cost of managing this system.
As the effect analysis has become a key factor that an enterprise or an organization constantly inputs in network security field, their requirements can’t be truly satisfied by merely detecting whether a vulnerability exists or adopting security measures to modify, but it is required to further analyze and understand the destruction that a vulnerability may bring to the assets of an organization. Normally, a vulnerability is not used independently, but multiple vulnerability groups are used to control the same one system. Similarly, the security policy can cover and repair multiple vulnerabilities. Hence, regarding the security management effect, the researchers shall evaluate different scenarios resulting in the destruction of fixed assets, and then put forward an optimized security strategy set to protect such kind of assets.
In the research of network system security model research, the researchers have made in-depth study, proposed such models as attack graph and attack tree, found out the attack path through these models, and finally determined the attack scenarios that may lead to destruction. However, though it is effective to determine the possible attack paths, it still couldn’t solve the problems that system administrators are facing. Obviously, they pay more attention to how to protect network from being invaded and to the determination of optimal reinforcement set. Furthermore, due to the limitations of financial budget, the system administrators can’t deploy all possible reinforcement strategies, or even cover all system vulnerabilities. Thus, they have to balance between the cost of realizing the security reinforcement measures subset and the destruction that may arise from leaving vulnerabilities. Besides, they also want to determine an optimal steady scheme. The security reinforcement set has the following characteristic, i.e. even if some reinforcement measures of the set fail, the system is still not been invaded successfully.
We believe that the security reinforcement problem can be solved in a more systematic manner by using various optimization tools. Through constantly exploring optimization method at different hierarchies, the administrative staffs can make better decisions rather than merely accepting an existing optimization scheme. For this purpose, the main contributions of this paper is as below:
The paper improves and formalizes the definition of attack tree, which can encode different security strategies that result in controlled system; The paper proposes a kind of model, which quantizes the attack leading to potential system destruction described by attack tree model. Meanwhile, it also quantizes the security measures cost paid to realize a security reinforcement strategy set; The paper models the system administrator’s decision problem, and realizes three gradually refined optimization processes in the system’s attack tree model; Finally, the proposed reinforcement method is discussed, especially the robust scheme generated in the optimization process. This process will help system administrator to determine the selected reinforcement scheme.
The reminder of the paper is organized as follows: Section 1 introduces the work related to security reinforcement optimization method; Section 2 briefs the background of multi-objective optimization; Section 3 proposes a simple network model used to construct attack scenarios; the attack tree model, cost model and their multi-objective optimization schemes will be elaborated in Sections 4 and 5. Section 6 will perform an experimental verification, and make a summary and prospect.
Related work
In the field of network security managment, there are many research achivements related is proposed. In Literature [1], Noel et al. used the dependency graph to compute the minimal reinforcement cost. According to the initial condition set in the graph structure, the Boolean values allocated to these conditions are calculated, and then some reinforcement strategies are used to strengthen them, so as to minimize the implementation cost of reinforcement strategies. The author points out that these initialization conditions rely on artificial accurate control. However, an attacker can use a different attack path to bypass the reinforcement measures of key assets. In Literature [2], Jha et al. don’t consider the cost of reinforcement measures, but find out the minimal atom attack set to achieve the coral assets, and finally search for the reinforcement measures on this minimal set. Above research aims to providing scheme for complete network security. Nevertheless, an enterprise always inputs limited fund, so the reinforcement strategy set still couldn’t fully cover the vulnerabilities. So the decision-makers should make a cost-benefit analysis to balance between the reinforcement cost and the coral network assets security. Moreover, a minimal-cost reinforcement measure set merely means that the coral assets are safe, but some residual destructions still exist in the network. On account of these real requirements needed to be attended, the network vulnerability management should not be simply interpreted as a single objective optimization problem. In Literature [3], the network vulnerability management has been formalized as a multi-objective optimization problem and officially put forward. Gupta et al. take the security strategy covering one or multiple common vulnerabilities as a set for consideration. A security strategy can also introduce possible vulnerabilities. Even if a security strategy is applied, there may be some residual vulnerabilities in the network as well. When considering to weight the residual vulnerabilities, multi-objective optimization problem can minimize the cost of realizing these security strategies. At last, the author adopts objective relative weight to combine two objectives into one.
Multi-objective optimization
In practical application scenarios, a problem is often formally described as multiple codes or design objectives, and the decision problem will be transfered to a problem for searching for optimal solution in multiple objectives, saying a multi-objective optimization problem, or called a vector optimization problem. Normally, considering from the cardinal number of scheme optimization set, a multi-objective optimization problem is different from a single-objective optimization problem. The ultimate goal of single-objective optimization is to find out a globally optimal solution, while the multi-objective optimization doesn’t have such concept. In the multi-objective optimization process, optimizing one objective may not affect other objectives as expect. Therefore, an optimization process taking all objectives into consideration doesn’t always exist. In such circumstances, it is required to use domain knowledge and make a decision from multiple trade-off analysis schemes, and this process often thinks more about realizing feasibility.
Because of the conflict feature of objective function, regarding the multi-objective optimization problem, a simple single-objective value can’t solve such problem. Thus, the majority of multi-objective optimization algorithms use the concept of “control” to compare feasibility schemes.
Regarding a given K-dimensional object set S, for feasible schemes
that’s to say, the eigenvalues of scheme
With regard to the network security optimization problem, particularly the problem of minimizing security reinforcement cost and network destruction in this paper, the concept of “control” plays a critical role in scheme assessment. A scheme may reduce an objective but promote another objective. A “control” based comparison could balance these two objectives to obtain a global optimal scheme. Next, let us see a typical case of network security optimization – the selection of security reinforcement scheme. Assume a network administrator of an enterprise plans to protect the enterprise intranet, and would like to find out a scheme with low reinforcement cost and minimal network risk left. In Fig. 1, every dot represents a reinforcement scheme, axis X denotes to the cost of reinforcement scheme, and axis Y denotes to the leaving risks (vulnerabilities) after adopting such reinforcement scheme. It can be seen that, the administrator only has to consider those red dots (reinforcement scheme) in the figure. Those non-red dots (reinforcement scheme) are not necessary to consider, because there is always a red dot (reinforcement scheme) with smaller reinforcement cost or less leaving risks. At this time, we can say that the red dots control all other black dots, while there is no control relationship between red dots. All red dots constitute the Pareto optimal set.
Pareto optimal set for safety reinforcement.
The study of Pareto query can be traced up to the year of 1975 at the earliest, when Kung et al. raised in Literature [4] the 2-dimensional and 3-dimensional data algorithm. The time complexity of this algorithm is
In order to validate the validity of the method proposed, a network scenario as shown in Fig. 2 is considered. The network includes 4 host computers, and the firewall is configured as preset strategy, to ensure that FTP server and SMTP server are allowed to link with external network. In addition, FTP and SSH are two services only allowing external users to access to internal server. Suppose that an external user wants to endanger a server within the protection range of firewall, and the firewall has been preset with strong rule set to protect the safety of internal host computer. In Fig. 2, according to the vulnerabilities listed in Table 1 and the network topography provided in Table 2, there may be six different attack scenarios to obtain the ultimate objective.
Host initialization vulnerabilities in network models
Host initialization vulnerabilities in network models
Connections between hosts in a network model
Network model example.
To control data server, the attacker used ftp/.rhost to attack and infiltrate FTP server and SMTP server. The ftp service version that these two servers were running had vulnerabilities that may be used. Furthermore, the rhost catalogue of this server didn’t correctly perform write-protection. The results of ftp/.rhost being utilized is a credible relationship established between victim host and attacker and the import of a vulnerability that can bypass authorization. After that, the attacker made use of user access right to login in these two servers. From this point, the attacker can use the connections between data server and FTP and SMTP servers, to further control data server. Likewise, the attacker could also choose controlling the terminal host to delay an attack. The terminal host can be controlled by the following method: “LICQ remote to user” and “local buffer overflow” vulnerabilities. At the end, through the two vulnerabilities, the attacker can not only select FTP and SMTP servers, but also select the connections between terminal host and data server to further control data server. Above depicted attack scenario can be represented by attack tree and will be detailed in the next section.
Due to the structure complexity of SCADA system, making a successful network attack offen needs to exploit multiple vulnerbilites and to combine multiple attacks to reach the goal of attacker. Therefore, in terms of attack prevention, it is very important to express the scenarios that different assets are attacked. The expression of attack scenarios could not only describe the possible way of controlling a system, but also help the administrator to determine a minimal attack prevention behavior set. According to the normal operation state of a network and its vulnerability presence circumstance, an attacker is able to easily use vulnerability to initiate an attack, and further approaches to the target he/she would like to control. The exact status of a network, especially the access right and network topology are the prerequisite that an attacker can make use of vulnerabilities. Once a vulnerability is used successfully by an attacker, the network status will be tampered so that he/she can continue to initiate the next attack. A pre-considered attack order may form an attack scenario. It is worth noting that such a progressive attack could trigger the transfer relationship between vulnerabilities in a network, which can be used to determine the network security scheme. In network vulnerability management, the attack graphs [1, 3, 17, 18] and attack trees [19, 20, 21] have already been proposed to express the causal relationship between vulnerabilities. In these data structures, the node represents a certain network status that the attacker is interested in, and the side represents the causal relationship of these statuses. In an attack graph, though different attack scenarios can be easily perceived, they are facing the status space explosion problem. In Literature [7], Ammann et al. became aware of this problem and raised an alternative solution based on the monotonicity hypothesis. This monotonicity characteristic indicates that a successful attack results can be acquired, and this hypothesis can greatly reduce the number of nodes in attack graph, but lose the possibility of further analyzing feasible attack scenarios. In accordance with the structure of attack graph or attack tree, the vulnerability dependency graph can be extracted to represent the connection and non-connection relationship between nodes. In this paper, the attack tree structure is used to represent the relationship between vulnerabilities. Such expression can use the different hierarchies of tree structure to represent the relationship between attacker’s sub-goals. One attack tree is capable of using explicit branches to decompose the subsequent connections and separation so as to reduce the visual complexity of an operation sequence. This expression mode is also helpful in effective calculation of the cost factor of points of interest.
For an attacker, different network features will let him/her to use different modes to control the system. First, to further analyze, the paper defines a feature template to uniformly classify these network features.
A feature template is a feature set of hardware and software configurations included in a network structure, as below (not limited to these):
System vulnerability. This vulnerability is normally reported by vulnerability database such as BugTraq, CERT/CC or NetCat, etc.; Network configuration, such as open port, unsafe firewall configuration, etc.; System configuration, such as data access right, unsafe default setting, read-write right to key files, etc.; Access configuration, such as user account, visitor account, root account, etc.; Networking topology.
A feature template can be used to classify the most atom features of network, and those atom features are always used by the attacker. For example, FTP server runs SSH1 with a version of v1.2.23, which can be taken as an instance of system vulnerability template. Likewise, an user uses terminal to access which can be taken as an access right template. In propositional logic, a template is allowed to self-define the feature, definition is as below:
A feature is the propositional case of a feature template, with its value to be true or false.
Whether an attacker can achieve his/her goal depends on that the eigenvalue of feature template in the network is true or not. This mainly relies on the feature modified by network administrator according to security strategies. Based on these features, the paper formally defines an attack model. Since the paper takes the atom feature of a network as a feature and defines its value as true or false, so all definitions related to these features can be expressed by propositional logic.
Let S be a feature set, and define Att as a mapping,
If it satisfies
The attack relative to the true values of
Let A be the attack set, and include
In addition, for all
Figure 2 shows an attack tree case, which
Cost model
To eliminate the effect of network attack, a network administrator must choose appropriate security reinforcement technology according to cost and coverage. For example, in order to prevent ftp/.rhost vulnerability being used, it is needful to consider using a security patch, closing FTP service, or simply adding write-protect to .rhost catalogue, and every selecting behavior means different costs. Besides, some methods have wider coverage but with larger cost. To maximize the resource use ratio, the security administrator has to make decision and selectively realize those security reinforcement subsets. However, considering n strategies, the decision always needs to be made from
Security plan starts from risk assessment, while the objective of risk is threats determination, loss anticipation, potential precaution scheme and installation cost. In brief, an security administrator should analyze the relative loss degree and reinforcement cost through risk assessment [22]. Nevertheless, the relative cost assessment method can’t provide sufficient information for top-priority strategy, which is particularly serious when an organization or institution faces restricted resources. In this article, Butler’s [23] multi-feature risk assessment framework is introduced to quantify the risk assessment features for security optimization. The framework proposed by Butler can conduct aggregation expression of multiple factors of commercial models of the controlled enterprise, which facilitates to extract the safety assets information relative to critical businesses.
First, define the concept of security measures in attack tree.
For an attack tree
In other words, the security measure is a precaution method used to prove that one or more features in the attack tree are false. And, under the condition of multiple security measure strategy
Potential destruction assessment
A potential destruction
Confirm the consequence of feature true value induced by some attack trees. In the proposed case, we have confirmed five outputs, and the loss earnings (fund), non-productive halt (time), destruction restore (fund), public crisis (serious) and legal punishment (serious) are represented by Evaluate the anticipated quantity For each possible consequence, use a univalent function to evaluate, Allocate a preference weight factor
Relying on the following formula, the potential destruction to a feature can be calculated:
When an attack tree is used, by considering the residual destruction after realizing the security strategy, we can obtain a better quantization expression. Hence, as the residual destruction in the subtree rooted as features increases, such features in the attack tree also increase.
Let
In the work of this paper, the feature
In an ideal circumstance, in a multi-set, all same features have the same
The residual destruction of a magnified attack tree is defined as below:
For an given magnified attack tree
Similar to potential destruction, the security administrator will firstly list a possible security cost required to realize a security measure, allocate its weight, and compute the generalized value. The sole difference between this calculation process and the residual destruction assessment is that the security cost assessment doesn’t need to anticipate the occurrence times. In our study, to realize a security measure, it is necessary to consider five different costs: installation cost (fund), operation cost (fund), system crash cost (time), incompatibility cost (range), and training cost (fund). For the security strategy
In terms of a given set including m security measures, each measure has its own cost
In the paper, for an attack tree exampled by the network model in Fig. 1, it needs to study the total security measure cost and residual destruction. As shown in Table 3, through placing patches and closing different services, 19 different security strategies are affirmed. After permutation and combination, there maybe more than 500,000 choices, and this requires to design valid algorithms to search for the optimal solution. In a real network environment, when there is a necessity to work out potential destruction and security measures, we should make clear of the relative priority between different services.
Security measures for the network model in Fig. 1
Security measures for the network model in Fig. 1
With respect to a magnified attack tree
The single-target optimization scheme is most possible to be adopted by the security administrator. For two targets, the preference-based methods generally coincide with intuition. However, as it’s discovered from network model, the effect of a scheme is very sensitive to weight. To express such kind of influence, this paper uses different
For a magnified attack tree
Such problems have to be solved by multi-objective optimization, thereby increasing the complexity of formulation. The multi-objective optimization method is able to relieve the demand for designated weight, so that a better solution can be obtained.
This paper uses a simple top-k algorithm to solve the problem 1 and Skyline algorithm to solve problem 2, as shown in Table 4.
The security hardening scheme obtained by Skyline algorithm
In this paper, through introducing the Skyline algorithm and attack tree model, it solves what troubles the system administrator in practice. That’s how to choose a subset from the given security reinforcement measures and minimize residual destruction with a minimal budget. In addition, introducing modularized idea to solve this problem enables decision-makers to compare various possible cost schemes and make a decision most conforming to the real situation ultimately.
The paper assumes the decision-making process only related to the realizing cost but doesn’t take other factors into consideration. It is hypothesized that every security measure is mutually independent, and the administrator makes his/her decision without being impacted by the cost of breaking the system. Actually, in a real organization’s network environment, this cost model seems too simple. By the way, during system operation, the administrator shall constantly adjust the security strategy of a model according to the emerging safety problems. Once there are more and more security strategies for this model, the serial multi-objective optimization algorithm can no longer satisfy the handling demands, so the distributed multi-objective optimization algorithm needs to be solved in future. The methods mentioned in this paper can be used not only in SCADA system, but also in most of IT systems. We hope this paper will provide a foundation for interested readers and inspire them to use this method in a wider range of systems.
