CySecTool: optimal investment portfolio for Cybersecurity

The CySecTool tool allows to model attack scenarios as probabilistic attack graphs, i.e. directed graphs where each edge represents a possible attack step. Attack steps can be mitigated by security controls (like patching, deploy firewalls, implement access controls etc): one step can be mitigated by several controls and one control can mitigate several attack steps. The tool allows the user to select a portfolio of security controls and display their effectiveness for that scenario.

Crucially CySecTool is equipped with an optimization engine calculating the optimal portfolio for that attack scenario.

The user can define any attack scenario he desires; define both possible mitigations and attack steps and for both provide numbers like probability of success, costs of mitigations etc..
Optimality of a portfolio is within budget constraints. The budget sliders in the tool are (user defined) abstractions of real budgets. There are two kind of costs considered in the calculations:

To access the tool click here.
The theory and mathematics behind this tool are explained in this paper.

Short tutorial

To clarify the basics of our setup, let us consider the following toy scenario: for the json source for this model click here . The user can upload this model on the tool using "load model" button.

Tool Explanation

The screenshot shows three areas of the tool:

The graph above (on the left) models an attack scenario where the initial state of the attacker is vertex 0 and the target state is vertex 3. An edge in the graph is an attack step, for example the attacker could take the leftmost edge and reach the target 3 in one step. Associated with each attack step are security controls which are effective against that attack step. For example, for the leftmost edge, control c3 is effective; for the edge from 1 to 2, there are two effective controls: c3 and c4. For simplicity, assume that each control has only one level of implementation and each control direct and indirect costs are 1. Suppose that when deploying c1, the attacker probability of success on that edge is 0.5, for c2 and c4 it is 0.2, and for c3 it is 0.1. The optimization is about answering questions like: ``suppose the defender has budget 2, i.e. can only choose two security controls out of c1,c2,c3,c4: which combination is the optimal choice in the sense of making the probability that the attacker successfully reaches vertex 3 the lowest?'' For example if the defender were to choose c3 and c4, then the attacker would reach 3 with probability 1 by following the path 0-> 1 ->3. However if the defender were to choose c2,c3 instead, then the attacker can reach 3 with probability 0.2 at most. In fact it can be shown that c2,c3 is the optimal defense choice.
If the user clicks "optimize" the controls c2,c3 will be shown as selected in the controls pane to the right of the graph, also the colors on the graph change to visualize the mitigation (reduction of the attacker probability of success) induced by selecting c2,c3.
Mathematically this is a bi-level optimization problem: the defender wants to minimize the attacker's maximal probability of reaching the target. The minimization is the outer problem and the maximization is the inner problem.
The user can satisfy her/him-self that this choice is optimal (within those budgets) by trying any other combination of controls within budget and noticing that it will not return a lower probability on the edge to the target.

modelling attack scenarios

The user can create a model from scratch by clicking on "new model" or can edit an existing model (models are written in json format and all model data is editable). A model is defined by a graph, i.e. a set of vertices and edges, and a set of controls, for example for the toy model above the data (visible/editable clicking on the edit button) is seen in the screenshots below

Tool Explanation edit1 Tool Explanation edit2

Each control is specified by a name, by the number of levels it can be implemented, by its direct and indirect costs and by its its flow (i.e. its effectiveness is deployed), e.g. a flow of 0.2 it means that if deployed that control would reduce the attacker probability on the edges the control is deployed by 0.2. Each edge has associated a list of controls, i.e. the controls that can mitigate that attack step.

The optimization engine is activated by clicking "optimize"; this will return the optimal portfolio for that choice of budgets and controls. The optimal portfolio is shown in the controls pane and the probabilities induced by that portfolio on each edge are visualised using colors in the graph pane; the lower the probability of success of the attacker on an edge in a path given the chosen portfolio the greener the edge color.
Another option is to compute the "Pareto frontier": this will display optimal solutions within budget constraints: Each point along the Pareto frontier is a portfolio that is optimal within budget and in relation to the indirect costs and security it induces.

When hovering over a point in the Pareto frontier graph you will see information like the cost of that portfolio (Direct cost) and its indirect cost (Organisation burden). Clicking on that point will display details of that portfolio on the control panels and on the graph in the main page

The default case study

the tool default case study (opening page or uploading "default template") is the following:

The attacker may try a direct CVE exploit, e.g. a ssh CVE, or may try a staged attack by first exploiting a CVE on the webserver, e.g. a CVE on apache and then enter the organization LAN for the second stage. From inside the LAN the attacker can try to get a user credentials by sniffing the traffic or through brute force. There are also multiple ways to obtain user credentials from the outside world, e.g. by phishing, by using a compromised external device e.g. a public machine with a key-logger or a malicious wi-fi, or by using a watering hole, that is, by infecting websites that the users are known to visit and tricking them to give their credentials. An attacker with a user credentials can then log in as a user on a machine.

An attacker can also bypass obtaining credentials, e.g. by exploiting a CVE exploit that allows remote privilege escalation from the web-server on the internal server, or if an internal machine is white-listed or has hard-coded credentials, or by social engineering attacks like ``whaling'' which is a highly customized and personalized form of phishing, or (after using watering hole attack) installing malware on the user's machine. Once in control as user of a machine, the attacker could attempt to escalate privileges to get admin control, which is the target in the attack graph.

To incorporate the unlikelihood of attacks corresponding to direct edges corresponding to exploiting a potential CVE in the ssh service and ``whaling'' attack, we apply default baseline probabilities of 0.5 and 0.2 on them, respectively. The default probabilities on all other edges were taken as default to be 1.

Associated with each attack step in the graph are possible mitigations or security controls. For example a CVE exploit has two possible mitigations ``Sc'': Secure configurations (patching, whitelisting), as well as ``N1'': external Network security (firewall).

Each security control may have several levels. In this case study, we define levels so that higher levels include mitigations at the lower level. For example ``Secure configuration'' has three possible levels of implementation: at level 1, it is implemented as ``keep software up to date''; at level 2 it is implemented as ``keep software up to date and patch software when security patches are released''; and level 3 also adds whitelisting (in fact we left some freedom for interpreting the highest levels, in this case for example some expert preferred thinking of blacklisting), i.e. only software on an approved list are allowed to run, besides keeping software up-to-date and installing patches upon release. As another example, for ``user education'' control, the lowest level is to provide basic training, e.g. via online resources like videos and MCQs; the next level is basic training plus simulated social engineering attacks, where e.g. phishing emails are sent to employees to see if they click on the links; and at the highest level disciplinary actions are announced for employees who fall for simulated attacks.

Note that the threat scenario represented by this attack graph is rather high level. For example, there are thousands of CVEs over different systems, also there are important mitigations not included like penetration testing, or data backup policy, etc. Our aim here is not to be exhaustive but to provide a stylized attack graph over which we can compare our results with experts' advice.

CySecTool


For questions on CySecTool you can contact us: p.malacaria@qmul.ac.uk and arman.khouzani@qmul.ac.uk. The graphical interface and visualization have been implemented by Przemyslaw Andrzej Buczkowski p.a.buczkowski@se18.qmul.ac.uk

This prototype tool has been developed within the EPSRC project "Customized and Adaptive approach for Optimal Cybersecurity Investment" (an EPSRC project involving Imperial College and Queen Mary University of London).