Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Measuring and Improving the Effectiveness of Defense-in-Depth Postures

Published

Author(s)

Peter M. Mell, James Shook, Richard Harang

Abstract

Defense-in-depth is an important security architecture principle that has significant application to industrial control systems (ICS), cloud services, storehouses of sensitive data, and many other areas. We claim that an ideal defense-in-depth posture is 'deep', containing many layers of security, and 'narrow', the number of node independent attack paths is minimized. Unfortunately, accurately calculating both depth and width is difficult using standard graph algorithms because of a lack of independence between multiple vulnerability instances (i.e., if an attacker can penetrate a particular vulnerability on one host then they can likely penetrate the same vulnerability on another host). To address this, we represent known weaknesses and vulnerabilities as a type of colored attack graph. We measure depth and width through solving the shortest color path and minimum color cut problems. We prove both of these to be NP-Hard and thus for our solution we provide a suite of greedy heuristics. We then empirically apply our approach to large randomly generated networks as well as to ICS networks generated from a published ICS attack template. Lastly, we discuss how to use these results to help guide improvements to defense-in-depth postures.
Proceedings Title
ICSS '16: Proceedings of the 2nd Annual Industrial Control System Security Workshop
Conference Dates
December 6, 2016
Conference Location
Los Angeles, CA
Conference Title
2nd Annual Industrial Control System Security Workshop (part of the 2016 Annual Computer Security Applications Conference)

Keywords

attack graph, defense in depth, measurement, security

Citation

Mell, P. , Shook, J. and Harang, R. (2017), Measuring and Improving the Effectiveness of Defense-in-Depth Postures, ICSS '16: Proceedings of the 2nd Annual Industrial Control System Security Workshop, Los Angeles, CA, [online], https://doi.org/10.1145/3018981.3018986 (Accessed April 28, 2024)
Created January 26, 2017, Updated November 10, 2018