期刊文献+

Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach

Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
原文传递
导出
摘要 The attack graph methodology can be used to identify the potential attack paths that an attack can propagate. A risk assessment model based on Bayesian attack graph is presented in this paper. Firstly, attack graphs are generated by the MULVAL(Multi-host, Multistage Vulnerability Analysis) tool according to sufficient information of vulnerabilities, network configurations and host connectivity on networks. Secondly, the probabilistic attack graph is established according to the causal relationships among sophisticated multi-stage attacks by using Bayesian Networks. The probability of successful exploits is calculated by combining index of the Common Vulnerability Scoring System, and the static security risk is assessed by applying local conditional probability distribution tables of the attribute nodes. Finally, the overall security risk in a small network scenario is assessed. Experimental results demonstrate our work can deduce attack intention and potential attack paths effectively, and provide effective guidance on how to choose the optimal security hardening strategy. The attack graph methodology can be used to identify the potential attack paths that an attack can propagate. A risk assessment model based on Bayesian attack graph is presented in this paper. Firstly, attack graphs are generated by the MULVAL(Multi-host, Multistage Vulnerability Analysis) tool according to sufficient information of vulnerabilities, network configurations and host connectivity on networks. Secondly, the probabilistic attack graph is established according to the causal relationships among sophisticated multi-stage attacks by using Bayesian Networks. The probability of successful exploits is calculated by combining index of the Common Vulnerability Scoring System, and the static security risk is assessed by applying local conditional probability distribution tables of the attribute nodes. Finally, the overall security risk in a small network scenario is assessed. Experimental results demonstrate our work can deduce attack intention and potential attack paths effectively, and provide effective guidance on how to choose the optimal security hardening strategy.
作者 GAO Ni HE Yiyue
出处 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期171-177,共7页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(61373176) the Natural Science Foundation of Shaanxi Province of China(2015JQ7278) the Scientific Research Plan Projects of Shaanxi Educational Committee(17JK0304,14JK1693)
关键词 risk assessment attack graph Bayesian networks prior probability risk assessment attack graph Bayesian networks prior probability
  • 相关文献

参考文献2

二级参考文献14

  • 1Pfleeger S L, et al, Insiders behaving badly: Addressing bad actors and their actions. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 169-179.
  • 2Afghan war diary, 2004-2010 [EB/OLJ. http://wikileaks. org/wiki/ Afghan_ WacDiary_2004-2010. 2010-07.
  • 3Schonlau M, Dumouchel W, Iu W, et al. Computer intrusion: Detecting masquerades. Statistical Science, 2001: 58-74.
  • 4Salem M, Stolfo S. Modeling user search behavior for masquerade detectionllProceeding of the 14th International Symposium Recent Advances in Intrusion Detection. Berlin Heidelberg: Springer, 2011: 181-200.
  • 5Zheng N, Palo ski A, Wang H, An efficient user verification system via mouse movementsllProceedings of the 18th ACM Conference On Computer and communications. Chicago, Illinois, USA, 2011: 139-150.
  • 6Brackney R C, Anderson R H. Understanding the Insider Threat: Proceedings of a March 2004 Workshop. Santa Monica, CA: RAND Corporation, 2004. http://www. rand. org/ pubs/conLproceedings/CF196.
  • 7Maloof M, Stephens G. Elicit: A system for detecting insiders who violate need-to-knowIIProceeding of the 14th International Symposium Recent Advances in Intrusion Detection. Berlin Heidelberg: Springer, 2007: 146-166.
  • 8Poolsappasit N, Dewri R, Ray 1. Dynamic security risk management using Bayesian attack graphs. IEEE Transactions on Dependable and Secure Computing, 2012, 9(1): 61-74.
  • 9Wang L, Noel S, Jajodia S. Minimum-cost network hardening using attack graph. Computer Communications, 2006, 29( 18): 3812-3824.
  • 10Wang L, et al, An attack graph-based probabilistic security metricllData and Applications Security XXII. Berlin Heidelberg: Springer, 2008: 283-296.

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部