Design Procedure of Knowledge Base for Practical Attack Graph Generation

被引:13
|
作者
Inokuchi, Masaki [1 ]
Ohta, Yoshinobu [1 ]
Kinoshita, Shunichi [1 ]
Yagyu, Tomohiko [1 ]
Stan, Orly [2 ]
Bitton, Ron [2 ]
Elovici, Yuval [2 ]
Shabtai, Asaf [2 ]
机构
[1] NEC Corp Ltd, Secur Res Labs, Tokyo, Japan
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
关键词
Risk assessment; Attack graph; Knowledge base; Design procedure;
D O I
10.1145/3321705.3329853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security assessment is an essential activity for understanding the security risks in an enterprise environment. While many tools have been developed in order to evaluate the security risks for individual hosts, it is still a challenge to identify multi-hop cyber security risks in a large-scale environment. An attack graph, which provides a comprehensive view of attacks, assists in identifying high-risk attack paths and efficiently deploying countermeasures. Several frameworks which generate an attack graph from system information and knowledge base have also been developed in the past. Although these tools are widely adopted, their expression capabilities are insufficient. The expansion of knowledge base is needed to handle comprehensive attack scenario. In this research, we developed an attack graph generation system by extending the MulVAL framework which is widely adopted due to its high extensibility. We designed and implemented knowledge base (also known as "interaction rules" in the MulVAL framework) for practical attack graph generation. A structured design procedure is necessary to construct a knowledge base that enables comprehensive analysis, which is highly important for actual risk assessment. We describe the design procedure, design considerations and implementation of our rule set. Additionally, we demonstrate the improvement to the generated attack graph by the implemented rules in a case study.
引用
收藏
页码:594 / 601
页数:8
相关论文
共 50 条
  • [1] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [2] Strategies for Practical Hybrid Attack Graph Generation and Analysis
    Li, Ming
    Hawrylak, Peter
    Hale, John
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):
  • [3] Knowledge Base Modeling and Design Procedure
    Burita, Ladislav
    Do, Petr
    Ondryhal, Vojtech
    INFORMATION MODELLING AND KNOWLEDGE BASES XXIII, 2012, 237 : 331 - 343
  • [4] Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
    Kaiser, Florian Klaus
    Dardik, Uriel
    Elitzur, Aviad
    Zilberman, Polina
    Daniel, Nir
    Wiens, Marcus
    Schultmann, Frank
    Elovici, Yuval
    Puzis, Rami
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4793 - 4809
  • [5] AI Supported Knowledge Graph Design and Generation
    Ratta, Marco
    SEMANTIC WEB: ESWC 2024 SATELLITE EVENTS, PT II, 2025, 15345 : 125 - 134
  • [6] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532
  • [7] Automatic Generation of Attack Strategy for Multiple Vulnerabilities Based on Domain Knowledge Graph
    Chen, Xiaosheng
    Shen, Wendi
    Yang, Genke
    IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [8] Concurrency Strategies for Attack Graph Generation
    Li, Ming
    Hawrylak, Peter J.
    Hale, John
    2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 174 - 179
  • [9] A method for global attack graph generation
    Man, Dapeng
    Zhang, Bing
    Yang, Wu
    Jin, Wenjin
    Yang, Yongtian
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 236 - +
  • [10] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567