Secure Configuration of Intrusion Detection Sensors for Dynamic Enterprise-Class Distributed Systems
Download
Author
Gaspar Modelo-Howard
Tech report number
CERIAS TR 2013-6
Entry type
phdthesis
Abstract
To secure today's computer systems, it is critical to have different intrusion detection sensors embedded in them. The complexity of distributed computer systems makes it difficult to determine the appropriate choice and placement of these detectors because there are many possible sensors that can be chosen, each sensor can be placed in several possible places in the distributed system, and overlaps exist between functionalities of the different detectors. For our work, we first describe a method to evaluate the effect a detector configuration has on the accuracy and precision of determining the systems security goals. The method is based on a Bayesian network model, obtained from an attack graph representation of the target distributed system that needs to be protected. We use Bayesian inference to solve the problem of determining the likelihood that an attack goal has been achieved, given a certain set of detector alerts. Based on the observations, we implement a dynamic programming algorithm for determining the optimal detector settings in a large-scale distributed system and compare it against a greedy algorithm, previously developed.
Download
Date
2013 – 5
Key alpha
Modelo-Howard
School
Purdue University
Publication Date
2013-05-01

