NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks

被引:9
|
作者
Ghosh, Nirnay [1 ]
Chokshi, Ishan [2 ]
Sarkar, Mithun [1 ]
Ghosh, Soumya K. [1 ]
Kaushik, Anil Kumar [3 ]
Das, Sajal K. [4 ]
机构
[1] Indian Inst Technol, Sch IT, Kharagpur 721302, W Bengal, India
[2] Oracle India Pvt Ltd, Bangalore 560076, Karnataka, India
[3] Govt India, Dept Elect & Informat Technol, Bombay, Maharashtra, India
[4] Missouri Univ S&T, Dept Comp Sci, Rolla, MO 65409 USA
关键词
Network security; Vulnerability assessment; Penetration testing; Attack graph; Mitigation strategy;
D O I
10.1145/2684464.2684494
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sophisticated cyber-attacks have become prominent with the growth of the Internet and web technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate hosts to compromise an otherwise well-protected critical resource. Conventional security assessment approaches can leave out some complex scenarios generated by these attacks. In the literature, these correlated attacks have been modeled using attack graphs. Although a few attack graph based network security assessment tools are available, they are either commercial products or developed using proprietary databases. In this paper, we develop a customized tool, NetSecuritas, which implements a novel heuristic-based attack graph generation algorithm and integrates different phases of network security assessment. NetSecuritas leverages open-source libraries, tools and publicly available databases. A cost-driven mitigation strategy has also been proposed to generate network security recommendations. Experimental results establish the efficacy of both attack graph generation and mitigation approach.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Graph-Based Hydraulic Vulnerability Assessment of Water Distribution Networks
    Fragiadakis, Michalis
    Xanthos, Savvas
    Eliades, Demetrios G.
    Gagatsis, Anastasis
    Christodoulou, Symeon E.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 81 - 87
  • [22] Ontology- and graph-based similarity assessment in biological networks
    Wang, Haiying
    Zheng, Huiru
    Azuaje, Francisco
    BIOINFORMATICS, 2010, 26 (20) : 2643 - 2644
  • [23] Graph-Based IoT Microservice Security
    Pahl, Marc-Oliver
    Aubet, Francois-Xavier
    Liebald, Stefan
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [24] Graph-Based Analysis in Network Security
    Collins, M. Patrick
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1333 - 1337
  • [25] Security Assessment of Computer Networks Based on Attack Graphs and Security Events
    Kotenko, Igor
    Doynikova, Elena
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 462 - 471
  • [26] A Graph-based Approach to Detect DoB Attack
    Thomas, Diya
    2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2021, : 422 - 423
  • [27] Graph-Based Resource Allocation for Air-Ground Integrated Networks
    Chen, Qian
    Meng, Weixiao
    He, Chenguang
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (02): : 492 - 501
  • [28] Graph-Based Resource Allocation for Air-Ground Integrated Networks
    Qian Chen
    Weixiao Meng
    Chenguang He
    Mobile Networks and Applications, 2022, 27 : 492 - 501
  • [29] Enterprise risk assessment model based on graph attention networks
    Bi, Kejun
    Liu, Chuanjie
    Guo, Bing
    APPLIED INTELLIGENCE, 2025, 55 (03)
  • [30] RFID System Security Assessment Methodology Based on Attack Graph Model
    Yang, Xiaoming
    Wang, Jiahao
    Huang, Yifu
    Qin, Zhiguang
    PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1161 - 1166