NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks

被引:9
|
作者
Ghosh, Nirnay [1 ]
Chokshi, Ishan [2 ]
Sarkar, Mithun [1 ]
Ghosh, Soumya K. [1 ]
Kaushik, Anil Kumar [3 ]
Das, Sajal K. [4 ]
机构
[1] Indian Inst Technol, Sch IT, Kharagpur 721302, W Bengal, India
[2] Oracle India Pvt Ltd, Bangalore 560076, Karnataka, India
[3] Govt India, Dept Elect & Informat Technol, Bombay, Maharashtra, India
[4] Missouri Univ S&T, Dept Comp Sci, Rolla, MO 65409 USA
关键词
Network security; Vulnerability assessment; Penetration testing; Attack graph; Mitigation strategy;
D O I
10.1145/2684464.2684494
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sophisticated cyber-attacks have become prominent with the growth of the Internet and web technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate hosts to compromise an otherwise well-protected critical resource. Conventional security assessment approaches can leave out some complex scenarios generated by these attacks. In the literature, these correlated attacks have been modeled using attack graphs. Although a few attack graph based network security assessment tools are available, they are either commercial products or developed using proprietary databases. In this paper, we develop a customized tool, NetSecuritas, which implements a novel heuristic-based attack graph generation algorithm and integrates different phases of network security assessment. NetSecuritas leverages open-source libraries, tools and publicly available databases. A cost-driven mitigation strategy has also been proposed to generate network security recommendations. Experimental results establish the efficacy of both attack graph generation and mitigation approach.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Extending Attack Graph-Based Metrics for Enterprise Network Security Management
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 315 - 325
  • [2] Attack Graph-Based Quantitative Assessment for Industrial Control System Security
    Zhang, Yaofang
    Wang, Bailing
    Wu, Chenrui
    Wei, Xiaojie
    Wang, Zibo
    Yin, Guohua
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 1748 - 1753
  • [3] An attack graph-based probabilistic security metric
    Wang, Lingyu
    Islam, Tania
    Long, Tao
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
  • [4] Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
    Salfer, Martin
    Eckert, Claudia
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [5] A Graph-Based Approach for Managing Enterprise Information System Security
    Sengupta, Anirban
    Manna, Asmita
    Mazumdar, Chandan
    2013 INTERNATIONAL CONFERENCE ON CLOUD & UBIQUITOUS COMPUTING & EMERGING TECHNOLOGIES (CUBE 2013), 2013, : 137 - +
  • [6] Analysis of Attack Graph-based Metrics for Quantification of Network Security
    Kundu, Arkadeep
    Ghosh, Nirnay
    Chokshi, Ishan
    Ghosh, Soumya K.
    2012 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2012, : 530 - 535
  • [7] Extending Attack Graph-Based Security Metrics and Aggregating Their Application
    Idika, Nwokedi
    Bhargava, Bharat
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 75 - 85
  • [8] An attack graph-based probabilistic computing approach of network security
    Ye Y.
    Xu X.-S.
    Jia Y.
    Qi Z.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 1987 - 1996
  • [9] Attack Graph Based Security Metrics for Dynamic Networks
    Gain, Ayan
    Barik, Mridul Sankar
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 109 - 128
  • [10] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347