ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration

Mohammed Noraden Alsaleh*, Ehab Al-Shaer, Ghaith Husari

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Automated cyber security configuration synthesis is the holy grail of cyber risk management. The effectiveness of cyber security is highly dependent on the appropriate configuration hardening of heterogeneous, yet interdependent, network security devices, such as firewalls, intrusion detection systems, IPSec gateways, and proxies, to minimize cyber risk. However, determining cost-effective security configuration for risk mitigation is a complex decision-making process because it requires considering many different factors including end-hosts’ security weaknesses based on compliance checking, threat exposure due to network connectivity, potential impact/damage, service reachability requirements according to business polices, acceptable usability due to security hardness, and budgetary constraints. Although many automated techniques and tools have been proposed to scan end-host vulnerabilities and verify the policy compliance, existing approaches lack metrics and analytics to identify fine-grained network access control based on comprehensive risk analysis using both the hosts’ compliance reports and network connectivity. In this paper, we present new metrics and a formal framework for automatically assessing the global enterprise risk and determining the most cost-effective security configuration for risk mitigation considering both the end-host security compliance and network connectivity. Our proposed metrics measure the global enterprise risk based on the end-host vulnerabilities and configuration weaknesses, collected through compliance scanning reports, their inter-dependencies, and network reachability. We then use these metrics to automatically generate a set of host-based vulnerability fixes and network access control decisions that mitigates the global network risk to satisfy the desired Return on Investment of cyber security. We solve the problem of cyber risk mitigation based on advanced formal methods using Satisfiability Module Theories, which has shown scalability with large-size networks.

Original languageEnglish
Pages (from-to)759-783
Number of pages25
JournalJournal of Network and Systems Management
Volume25
Issue number4
DOIs
StatePublished - 1 Oct 2017
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2017, Springer Science+Business Media, LLC.

Keywords

  • Analytics
  • Constraints satisfaction
  • Host compliance
  • Risk metrics
  • SMT
  • Security hardening

ASJC Scopus subject areas

  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications
  • Strategy and Management

Fingerprint

Dive into the research topics of 'ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration'. Together they form a unique fingerprint.

Cite this