A Novel Method for Host Risk Assessment Based on Predecessor Attack

被引:0
|
作者
Zhang, Xiao-song [1 ]
Huang, Lei [1 ]
Xu, Chun-xiang [1 ]
Chen, Ting [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 611731, Peoples R China
关键词
network security; vulnerability; host risk assessment; predecessor attack;
D O I
10.1117/12.913276
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is universally admitted that propagable attacks pose a more serious threat to network than a single attack. And the propagation of attacks mainly depends on vulnerabilities. Popular vulnerabilities assessment tools are able to detect hosts' vulnerabilities in detail and produce the related reports. However they always ignore the threats led by predecessor attacks from other hosts in the network, because they do not take the network conditions into consideration. In this paper, digraph is used to generate the attack paths by virtue of network and vulnerabilities information. And according to the attacks relationship of hosts, the risk of predecessor attack is considered for the general risk calculation of target hosts. A method is presented to assess the risk of hosts in network environment qualitatively and quantitatively.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
    Shang, Wenli
    Gong, Tianyu
    Chen, Chunyu
    Hou, Jing
    Zeng, Peng
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [22] Risk Assessment of Attack in Autonomous Vehicle based on a Decision Tree
    Ftaimi, Sara
    Mazri, Tomader
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 792 - 801
  • [23] A RISK ASSESSMENT SCHEME OF INTELLIGNET TERMINAL BASED ON ATTACK TREE
    Wei, Fang
    Zhang, Miao
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 67 - 71
  • [24] Hardware Attack Risk Assessment
    Moein, Samer
    Gebali, Fayez
    Gulliver, T. Aaron
    El-Kharashi, M. Watheq
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 346 - 350
  • [25] A Novel Method for Risk Assessment and Simulation of Collision Avoidance for Vessels based on AIS
    ManhCuong Nguyen
    Zhang, Shufang
    Wang, Xiaoye
    ALGORITHMS, 2018, 11 (12):
  • [26] A novel method of risk assessment based on cloud inference for natural gas pipelines
    Guo, Yanbao
    Meng, Xiaoli
    Meng, Tao
    Wang, Deguo
    Liu, Shuhai
    JOURNAL OF NATURAL GAS SCIENCE AND ENGINEERING, 2016, 30 : 421 - 429
  • [27] A novel method of quantitative risk assessment based on grid difference of pipeline sections
    Ma, Lei
    Li, Yongshu
    Liang, Lei
    Li, Manchun
    Cheng, Liang
    SAFETY SCIENCE, 2013, 59 : 219 - 226
  • [28] A Novel Method for Agricultural Drought Risk Assessment
    Wei Pei
    Qiang Fu
    Dong Liu
    Tianxiao Li
    Kun Cheng
    Song Cui
    Water Resources Management, 2019, 33 : 2033 - 2047
  • [29] A Novel Method for Agricultural Drought Risk Assessment
    Pei, Wei
    Fu, Qiang
    Liu, Dong
    Li, Tianxiao
    Cheng, Kun
    Cui, Song
    WATER RESOURCES MANAGEMENT, 2019, 33 (06) : 2033 - 2047
  • [30] A Practical Method to Attack Deep Learning Based Host Intrusion Detection Systems
    Zhang, Sicong
    Xie, Xiaoyao
    Xu, Yang
    International Journal of Network Security, 2021, 23 (04) : 663 - 676