A budgeted maximum multiple coverage model for cybersecurity planning and management

Abstract This article studies how to identify strategies for mitigating cyber-infrastructure vulnerabilities. We propose an optimization framework that prioritizes the investment in security mitigations to maximize the coverage of vulnerabilities. We use multiple coverage to reflect the implementation of a layered defense, and we consider the possibility of coverage failure to address the uncertainty in the effectiveness of some mitigations. Budgeted Maximum Multiple Coverage (BMMC) problems are formulated, and we demonstrate that the problems are submodular maximization problems subject to a knapsack constraint. Other variants of the problem are formulated given different possible requirements for selecting mitigations, including unit cost cardinality constraints and group cardinality constraints. We design greedy approximation algorithms for identifying near-optimal solutions to the models. We demonstrate an optimal (1–1/e)-approximation ratio for BMMC and a variation of BMMC that considers the possibility of coverage failure, and a 1/2-approximation ratio for a variation of BMMC that uses a cardinality constraint and group cardinality constraints. The computational study suggests that our models yield robust solutions that use a layered defense and provide an effective mechanism to hedge against the risk of possible coverage failure. We also find that the approximation algorithms efficiently identify near-optimal solutions, and that a Benders branch-and-cut algorithm we propose can find provably optimal solutions to the vast majority of our test instances within an hour for the variations of the proposed models that consider coverage failures.

[1]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[2]  Nadya Bartol,et al.  Supply Chain Risk Management Practices for Federal Information Systems and Organizations , 2015 .

[3]  Jan Vondrák,et al.  Optimal approximation for the submodular welfare problem in the value oracle model , 2008, STOC.

[4]  Mark S. Daskin,et al.  Network and Discrete Location: Models, Algorithms, and Applications, Second Edition , 2013 .

[5]  Hadas Shachnai,et al.  Approximations for Monotone and Nonmonotone Submodular Maximization with Knapsack Constraints , 2013, Math. Oper. Res..

[6]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[7]  Matteo Fischetti,et al.  Algorithms for the Set Covering Problem , 2000, Ann. Oper. Res..

[8]  Sheldon Howard Jacobson,et al.  Modeling aviation baggage screening security systems: a case study , 2003 .

[9]  Jan Vondrák,et al.  Maximizing a Monotone Submodular Function Subject to a Matroid Constraint , 2011, SIAM J. Comput..

[10]  Senay Solak,et al.  Measuring and Optimizing Cybersecurity Investments: A Quantitative Portfolio Approach , 2014 .

[11]  Maxim Sviridenko,et al.  A note on maximizing a submodular set function subject to a knapsack constraint , 2004, Oper. Res. Lett..

[12]  Robert J. Ellison,et al.  Attack Trees , 2009, Encyclopedia of Biometrics.

[13]  Richard L. Church,et al.  The maximal covering location problem , 1974 .

[14]  Adam Shostack,et al.  Threat Modeling: Designing for Security , 2014 .

[15]  J. Goldberg Operations Research Models for the Deployment of Emergency Services Vehicles , 2004 .

[16]  Gio K. Kao,et al.  Supply Chain Decision Analytics: Application and Case Study for Critical Infrastructure Security. , 2015 .

[17]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[18]  Anna Nagurney,et al.  Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability , 2017, Eur. J. Oper. Res..

[19]  Sheldon Howard Jacobson,et al.  Modeling and analyzing multiple station baggage screening security system performance , 2005 .

[20]  Clare Brindley,et al.  Supply chain risk , 2004 .

[21]  Maxim Sviridenko,et al.  Pipage Rounding: A New Method of Constructing Algorithms with Proven Performance Guarantee , 2004, J. Comb. Optim..

[22]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[23]  J. Beasley A lagrangian heuristic for set‐covering problems , 1990 .

[24]  James R. Clapper Statement for the Record, Worldwide Threat Assessment of the US Intelligence Community, Senate Select Committee on Intelligence, James R. Clapper, Director of National Intelligence, March 12, 2013 , 2013 .

[25]  Christodoulos A. Floudas Generalized Benders Decomposition , 2009, Encyclopedia of Optimization.

[26]  Fredrick M. McCrory,et al.  Supply Chain Risk Management: The Challenge in a Digital World. , 2015 .

[27]  Roy Schwartz,et al.  Comparing Apples and Oranges: Query Trade-off in Submodular Maximization , 2017, Math. Oper. Res..

[28]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[29]  Alexander Shapiro,et al.  The Sample Average Approximation Method for Stochastic Discrete Optimization , 2002, SIAM J. Optim..

[30]  Theodore T. Allen,et al.  Data-Driven Cyber-Vulnerability Maintenance Policies , 2014 .

[31]  Samir Khuller,et al.  The Budgeted Maximum Coverage Problem , 1999, Inf. Process. Lett..

[32]  David P. Morton,et al.  Prioritization via Stochastic Optimization , 2015, Manag. Sci..

[33]  Mark S. Daskin,et al.  Network and Discrete Location: Models, Algorithms and Applications , 1995 .

[34]  Gilbert Laporte,et al.  Ambulance location and relocation models , 2000, Eur. J. Oper. Res..

[35]  Stephen M. Hess,et al.  Prioritizing Project Selection , 2009 .

[36]  Jan Vondrák,et al.  Fast algorithms for maximizing submodular functions , 2014, SODA.

[37]  John T. Michalski,et al.  Supply Chain Security Decision Analytics: Macro Analysis. , 2015 .

[38]  Amit Kumar,et al.  Maximum Coverage Problem with Group Budget Constraints and Applications , 2004, APPROX-RANDOM.

[39]  Sanjeeb Dash,et al.  Strengthened Benders Cuts for Stochastic Integer Programs with Continuous Recourse , 2017, INFORMS J. Comput..

[40]  Anna Nagurney,et al.  A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability , 2015 .