Maintaining a resilient computer network is a delicate task with conflicting priorities. Flows should be served while controlling risk due to attackers. Configuration is time intensive and largely static until a major new vulnerability forces change. Tools exist to check network reachability (Khurshid et al., NSDI 2013) and risk using (probabilistic) attack graphs (Sheyner et al., IEEE S\&P 2002). However, these tools are not designed to fashion configurations that simultaneously satisfy multiple properties. We introduce FASHION: a linear optimizer that fashions network configurations that balance functionality and security requirements. FASHION formalizes functionality as a multi-commodity flow problem with side-constraints. FASHION's primary technical contribution is formulating an approximation of network risk that can be solved using a binary integer program. The approximation linearly combines two measures. One measure is the impact of the set of nodes the attacker can reach in the attack graph (ignoring probability). The second is the maximum probability path in the attack graph. FASHION is evaluated on data center networks. The evaluation synthesizes attack graphs on the fat tree topology with up to 128 hosts and 81 network devices. FASHION usually outputs a solution in under 10 minutes, allowing response to short term changes in functionality or security. Solutions are monotonic for all observed experiments: as one increases weight on the security objective, the actual risk, as evaluated by a probabilistic attack graph analysis, never increases. FASHION outputs a set of software-defined networking rules consumable by a Frenetic controller (Foster et al., ICFP 2011). FASHION allows an enterprise to automatically reconfigure their network upon a change in functionality (shift in user demand) or security (publication or patching of a vulnerability).
翻译:维护具有复原力的计算机网络是一个复杂的任务, 具有互相冲突的优先事项。 在控制攻击者的风险时, 流程应该使用。 配置是时间密集且基本静止的, 直到新的脆弱因素发生重大改变。 存在用来检查网络可达性的工具( Khurshid 等人, NSDI 2013), 以及使用( 概率) 攻击图的风险( Sheyner 等人, IEEEE S ⁇ P 2002 ) 。 但是, 这些工具并不是设计用来在攻击图形中同时显示能够满足多个属性的配置。 我们引入了 FASASHI : 一个线性优化的线性优化, 以时平调的功能和安全要求。 FASHI: 将攻击性指令作为多通的流程流问题正式化功能。 FSASHI: 通常的直径直径直图化为直径直径直的FSISA值, 直通至直径直径直径直径直的直径直的直径直径直径直径直方形直径直方方方形方形方形方形方形方形方形方形直方形方形方形方形方形直方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形方形对方形方形方形方形方形方形方形对方形对方形对方形。