An Attack Graph Based Metric for Security Evaluation of Computer Networks

被引:0
|
作者
Keramati, Marjan [1 ]
Akbari, Ahmad [1 ]
机构
[1] IUST, Dept Comp Engn, Tehran, Iran
关键词
component; Security metric; Compact attack graph; Risk; Quantitative metric; Network hardening;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
nowadays computer networks face with multi-step attacks, during which, intruder exploits multiple vulnerabilities in a specific manner to attack his victim. So for assessing network security it is essential to understand which vulnerabilities and how must be exploited by the attacker to reach his goal. Such information can be obtained by modeling the network with attack graph. Current approaches for security assessment lack quantitative nature whereas for accurate decision making in security improvement of the network, it is necessary to measure security risk of possible attacks in the network quantitatively. In this paper an attack graph based security metric was proposed that can measure security risk of possible attacks in the network quantitatively. This metric can compute risk degradation options in terms of maximizing security and minimizing cost. Our security metric can be used to calculate total network security quantitatively and can be used for performing cost-benefit tradeoff in network hardening systems. The result of using the proposed metric with one network hardening framework on one well-known example is shown in this paper.
引用
收藏
页码:1094 / 1098
页数:5
相关论文
共 50 条
  • [1] Computer network security evaluation method based on improved attack graph
    Li, Zhaocui
    Liu, Huichuan
    Wu, Chunyan
    Journal of Cyber Security Technology, 2022, 6 (04) : 201 - 215
  • [2] An attack graph-based probabilistic security metric
    Wang, Lingyu
    Islam, Tania
    Long, Tao
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
  • [3] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [4] Attack Graph Based Security Metrics for Dynamic Networks
    Gain, Ayan
    Barik, Mridul Sankar
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 109 - 128
  • [5] Security Assessment of Computer Networks Based on Attack Graphs and Security Events
    Kotenko, Igor
    Doynikova, Elena
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471
  • [6] An approach of security risk evaluation based on the Bayesian attack graph
    Hui, Wang
    Fuwang, Chen
    Yunfeng, Wang
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 953 - 960
  • [7] RESEARCH ON SECURITY EVALUATION OF CLOUD COMPUTING BASED ON ATTACK GRAPH
    Cheng, Yexia
    Du, Yuejin
    Xu, Junfeng
    Yuan, Chunyang
    Xue, Zhi
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 459 - 465
  • [8] Two Stochastic Models for Security Evaluation Based on Attack Graph
    Zhang, Yinqian
    Fan, Xun
    Xue, Zhi
    Xu, Hao
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2198 - 2203
  • [9] Study of network security evaluation based on attack graph model
    Electronic Engineering Institute, Hefei 230037, China
    不详
    Tongxin Xuebao, 2007, 3 (29-34):
  • [10] Study of Generating Attack Graph based on Privilege Escalation for Computer Networks
    Chen, Xiuzhen
    Li, Jianhua
    Zhang, Shaojun
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1213 - 1217