A Novel Method for Host Risk Assessment Based on Predecessor Attack

被引:0
|
作者
Zhang, Xiao-song [1 ]
Huang, Lei [1 ]
Xu, Chun-xiang [1 ]
Chen, Ting [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 611731, Peoples R China
关键词
network security; vulnerability; host risk assessment; predecessor attack;
D O I
10.1117/12.913276
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is universally admitted that propagable attacks pose a more serious threat to network than a single attack. And the propagation of attacks mainly depends on vulnerabilities. Popular vulnerabilities assessment tools are able to detect hosts' vulnerabilities in detail and produce the related reports. However they always ignore the threats led by predecessor attacks from other hosts in the network, because they do not take the network conditions into consideration. In this paper, digraph is used to generate the attack paths by virtue of network and vulnerabilities information. And according to the attacks relationship of hosts, the risk of predecessor attack is considered for the general risk calculation of target hosts. A method is presented to assess the risk of hosts in network environment qualitatively and quantitatively.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Individual risk assessment for worm attack
    Schnieder, Thomas
    KLEINTIERPRAXIS, 2008, 53 (12): : 797 - 799
  • [42] Cloud Attack and Risk Assessment Taxonomy
    Juliadotter, Nina Viktoria
    Choo, Kim-Kwang Raymond
    IEEE CLOUD COMPUTING, 2015, 2 (01): : 14 - 20
  • [43] Scalable Attack Graph for Risk Assessment
    Lee, Jehyun
    Lee, Heejo
    In, Hoh Peter
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82
  • [44] A Network Security Situation Assessment Method Based On Attack Intention Perception
    Kou Guang
    Tang Guangming
    Ding Xia
    Wang Shuo
    Wang Kun
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1138 - 1142
  • [45] ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds
    Liu, Zhen
    Hu, ChangZhen
    Shan, Chun
    Yan, Zheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4070 - 4084
  • [46] A novel fuzzy risk matrix based risk assessment approach
    Can, Gulin Feryal
    Toktas, Pelin
    KYBERNETES, 2018, 47 (09) : 1721 - 1751
  • [47] A novel method of constituting network security policy based on attack graphs
    Ma, Junchun
    Wang, Yongjun
    Sun, Jiyin
    Ma, J. (chenshan1223@126.com), 1600, Inst. of Scientific and Technical Information of China (22): : 374 - 381
  • [48] Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
    Yao, Yuan
    Xiao, Bin
    Wu, Gaofei
    Liu, Xue
    Yu, Zhiwen
    Zhang, Kailong
    Zhou, Xingshe
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 591 - 602
  • [49] A Value based Security Risk Assessment Method
    Shi, Yijie
    Wen, Qiaoyan
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 49 - 51
  • [50] A Risk Assessment Method based on Software Behavior
    Chen, Guorong
    Wang, Kun
    Tan, Jian
    Li, Xiaoyong
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 47 - 52