@inproceedings{4dcb314bb33c45c7a7baeb6f33d81a46,
title = "Security modelling and analysis of dynamic enterprise networks",
abstract = "Dynamic networks can be characterised by many factors such as changes (e.g., vulnerability change, update of applications and services, topology changes). It is of vital importance to assess the security of such dynamic networks in order to improve the security of them. One way to assess the security is to use a graphical security model. However, the existing graphical security models (e.g., attack graphs and attack trees) have only considered static networks (i.e. the network does not change). It is also unclear how the existing cyber security metrics (e.g., attack cost, shortest attack path) change when the network configuration changes over time. To address this problem, we propose (i) to develop a novel graphical security model named Temporal-Hierarchical Attack Representation Model (T-HARM) to capture network changes and (ii) investigate the effect of network change on the existing cyber security metrics based on the proposed security model. We show how the existing security metrics change when the status of vulnerabilities changes.",
keywords = "Attack graphs, Attack trees, Graphical security model, Security metrics",
author = "Yusuf, {Simon Enoch} and Mengmeng Ge and Hong, {Jin B.} and Kim, {Huy Kang} and Paul Kim and Kim, {Dong Seong}",
note = "Funding Information: This paper was made possible by Grant NPRP 8-531-1-111 from Qatar National Research Fund (QNRF). The statements made herein are solely the responsibility of the authors Publisher Copyright: {\textcopyright} 2016 IEEE.; 16th IEEE International Conference on Computer and Information Technology, CIT 2016 ; Conference date: 07-12-2016 Through 10-12-2016",
year = "2017",
month = mar,
day = "10",
doi = "10.1109/CIT.2016.88",
language = "English",
series = "Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "249--256",
booktitle = "Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016",
}