A Novel Method for Host Risk Assessment Based on Predecessor Attack

被引:0
|
作者
Zhang, Xiao-song [1 ]
Huang, Lei [1 ]
Xu, Chun-xiang [1 ]
Chen, Ting [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 611731, Peoples R China
关键词
network security; vulnerability; host risk assessment; predecessor attack;
D O I
10.1117/12.913276
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is universally admitted that propagable attacks pose a more serious threat to network than a single attack. And the propagation of attacks mainly depends on vulnerabilities. Popular vulnerabilities assessment tools are able to detect hosts' vulnerabilities in detail and produce the related reports. However they always ignore the threats led by predecessor attacks from other hosts in the network, because they do not take the network conditions into consideration. In this paper, digraph is used to generate the attack paths by virtue of network and vulnerabilities information. And according to the attacks relationship of hosts, the risk of predecessor attack is considered for the general risk calculation of target hosts. A method is presented to assess the risk of hosts in network environment qualitatively and quantitatively.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Mobile Networks and Applications, 2023,
  • [2] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1504 - 1513
  • [3] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
  • [4] A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
    Luo, Zhiyong
    Xu, Rui
    Wang, Jianming
    Zhu, Weicheng
    International Journal of Network Security, 2022, 24 (05) : 787 - 796
  • [5] A Distributed network risk assessment method based on attack graph
    Yang, Tian Chi
    Fang, Ming
    Shao, Qi Feng
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
  • [6] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [7] Risk Assessment and Diagnostic Method of Sulfate Attack of Cement-based Material
    Zhang, Fengchen
    Fang, Yonghao
    Shen, Dejian
    Zhou, Jikai
    ADVANCED BUILDING MATERIALS AND SUSTAINABLE ARCHITECTURE, PTS 1-4, 2012, 174-177 : 121 - +
  • [8] A Risk Assessment Method of Network Host Node with Host Importance
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2022, 45 (02): : 16 - 21
  • [9] A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs
    Ren, Dandan
    Du, Suguo
    Zhu, Haojin
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [10] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated
    Yang, Jungang
    Liang, Li
    Yang, Yanfeng
    Zhu, Guangliang
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118