NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks

被引:9
|
作者
Ghosh, Nirnay [1 ]
Chokshi, Ishan [2 ]
Sarkar, Mithun [1 ]
Ghosh, Soumya K. [1 ]
Kaushik, Anil Kumar [3 ]
Das, Sajal K. [4 ]
机构
[1] Indian Inst Technol, Sch IT, Kharagpur 721302, W Bengal, India
[2] Oracle India Pvt Ltd, Bangalore 560076, Karnataka, India
[3] Govt India, Dept Elect & Informat Technol, Bombay, Maharashtra, India
[4] Missouri Univ S&T, Dept Comp Sci, Rolla, MO 65409 USA
关键词
Network security; Vulnerability assessment; Penetration testing; Attack graph; Mitigation strategy;
D O I
10.1145/2684464.2684494
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sophisticated cyber-attacks have become prominent with the growth of the Internet and web technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate hosts to compromise an otherwise well-protected critical resource. Conventional security assessment approaches can leave out some complex scenarios generated by these attacks. In the literature, these correlated attacks have been modeled using attack graphs. Although a few attack graph based network security assessment tools are available, they are either commercial products or developed using proprietary databases. In this paper, we develop a customized tool, NetSecuritas, which implements a novel heuristic-based attack graph generation algorithm and integrates different phases of network security assessment. NetSecuritas leverages open-source libraries, tools and publicly available databases. A cost-driven mitigation strategy has also been proposed to generate network security recommendations. Experimental results establish the efficacy of both attack graph generation and mitigation approach.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] An integrated graph data privacy attack framework based on graph neural networks in IoT
    Zhao, Xiaoran
    Peng, Changgen
    Ding, Hongfa
    Tan, Weijie
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (20):
  • [32] Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM
    Liu, Nian
    Zhang, Jianhua
    Zhang, Hao
    Liu, Wenxia
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (03) : 1492 - 1500
  • [33] Integrated Safety and Security by Design in the IT/OT Convergence of Industrial Systems: A Graph-Based Approach
    Amiri, Amirali
    Steindl, Gernot
    Gorton, Ian
    Hollerer, Siegfried
    Kastner, Wolfgang
    Sauter, Thilo
    2024 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SERVICES ENGINEERING, SSE 2024, 2024, : 123 - 129
  • [34] Graph-based relational learning with application to security
    Holder, L
    Cook, D
    Coble, J
    Mukherjee, M
    FUNDAMENTA INFORMATICAE, 2005, 66 (1-2) : 83 - 101
  • [35] PRIMROSe: A Graph-Based Approach for Enterprise Architecture Analysis
    Naranjo, David
    Sanchez, Mario
    Villalobos, Jorge
    ENTERPRISE INFORMATION SYSTEMS, ICEIS 2014, 2015, 227 : 434 - 452
  • [36] Towards Graph-Based Analysis of Enterprise Architecture Models
    Smajevic, Muhamed
    Bork, Dominik
    CONCEPTUAL MODELING, ER 2021, 2021, 13011 : 199 - 209
  • [37] An Integrated Network Scanning Tool for Attack Graph Construction
    Cheng, Feng
    Roschke, Sebastian
    Meinel, Christoph
    ADVANCES IN GRID AND PERVASIVE COMPUTING, 2011, 6646 : 138 - 147
  • [38] Vulnerability Metrics for Graph-based Configuration Security
    Igartibo, Ibifubara
    Albanese, Massimiliano
    Mosko, Marc
    Bier, Eric
    Brito, Alejandro E.
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 259 - 270
  • [39] A Graph-Based Approach for Analysis of Software Security
    Lunkeit, Armin
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 68 - 79
  • [40] Graph-Based Global Reasoning Networks
    Chen, Yunpeng
    Rohrbach, Marcus
    Yan, Zhicheng
    Yan, Shuicheng
    Feng, Jiashi
    Kalantidis, Yannis
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 433 - 442