Response policies and counter-measure : management of service dependencies and intrusion and reaction impacts / Nizar Kheir ; sous la direction de Frédéric Cuppens

Date :

Editeur / Publisher : [S.l.] : [s.n.] , 2010

Type : Livre / Book

Type : Thèse / Thesis

Langue / Language : anglais / English

Systèmes informatiques -- Mesures de sûreté

Télécommunications -- Trafic

Cuppens, Frédéric (1962-....) (Directeur de thèse / thesis advisor)

Ecole nationale supérieure des télécommunications de Bretagne (Brest ; 1977-2016) (Organisme de soutenance / degree-grantor)

Université de Rennes 1 (1969-2022) (Autre partenaire associé à la thèse / thesis associated third party)

Université européenne de Bretagne (2007-2016) (Autre partenaire associé à la thèse / thesis associated third party)

École doctorale Mathématiques, télécommunications, informatique, signal, systèmes, électronique (Rennes) (Ecole doctorale associée à la thèse / doctoral school)

Relation : Response policies and counter-measure : management of service dependencies and intrusion and reaction impacts / Nizar Kheir ; sous la direction de Frédéric Cuppens / Lille : Atelier national de reproduction des thèses , 2010

Résumé / Abstract : Nowadays, intrusion response is challenged by both attack sophistication and the complexity of target systems. In fact, Internet currently provides an exceptional facility to share resources and exploits between novice and skilled attackers. As a matter of fact, simply detecting or locally responding against attacks has proven to be insufficient. On the other hand, in order to keep pace with the growing need for more interactive and dynamic services, information systems are getting increasingly dependent upon modular and interdependent service architectures. In consequence, intrusions and responses often have drastic effects as their impacts spread through service dependencies. We argue in this thesis that service dependencies have multiple security implications. In the context of intrusion response, service dependencies can be used to find the proper enforcement points which are capable to support a specific response strategy. They can be also used in order to compute the impact of such responses in order to select the least costly response. In a first attempt to realize the thesis objectives, we explore graph-based service dependency models. We implement intrusion and response impacts as security flows that propagate within a directed graph. We introduce countermeasures as transformations to the dependency graph, and which have direct implications on the impact flows triggered by an intrusion. In a second step, we replace the analytic graph-based approach with a simulation-based approach using colored Petri nets. We develop for this purpose a new service dependency model that outperforms the initial graph-based models. It represents access permissions that apply to service dependencies. Attacker permissions are also implemented in this model by interfacing with attack graphs. We develop a simulation platform that tracks the propagation of intrusion impacts, response impacts, and the combined impacts for intrusion and response. We define a new response index, the return on response investment (RORI), that we evaluate for each response candidate with the aim to select the one that provides a maximal positive RORI index.