Design Procedure of Knowledge Base for Practical Attack Graph Generation

被引:13
|
作者
Inokuchi, Masaki [1 ]
Ohta, Yoshinobu [1 ]
Kinoshita, Shunichi [1 ]
Yagyu, Tomohiko [1 ]
Stan, Orly [2 ]
Bitton, Ron [2 ]
Elovici, Yuval [2 ]
Shabtai, Asaf [2 ]
机构
[1] NEC Corp Ltd, Secur Res Labs, Tokyo, Japan
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
关键词
Risk assessment; Attack graph; Knowledge base; Design procedure;
D O I
10.1145/3321705.3329853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security assessment is an essential activity for understanding the security risks in an enterprise environment. While many tools have been developed in order to evaluate the security risks for individual hosts, it is still a challenge to identify multi-hop cyber security risks in a large-scale environment. An attack graph, which provides a comprehensive view of attacks, assists in identifying high-risk attack paths and efficiently deploying countermeasures. Several frameworks which generate an attack graph from system information and knowledge base have also been developed in the past. Although these tools are widely adopted, their expression capabilities are insufficient. The expansion of knowledge base is needed to handle comprehensive attack scenario. In this research, we developed an attack graph generation system by extending the MulVAL framework which is widely adopted due to its high extensibility. We designed and implemented knowledge base (also known as "interaction rules" in the MulVAL framework) for practical attack graph generation. A structured design procedure is necessary to construct a knowledge base that enables comprehensive analysis, which is highly important for actual risk assessment. We describe the design procedure, design considerations and implementation of our rule set. Additionally, we demonstrate the improvement to the generated attack graph by the implemented rules in a case study.
引用
收藏
页码:594 / 601
页数:8
相关论文
共 50 条
  • [21] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [22] Computer-attack graph generation tool
    Swiler, LP
    Phillips, C
    Ellis, D
    Chakerian, S
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 307 - 321
  • [23] ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING
    Misra, Sudip
    Obaidat, Mohammad S.
    Bagchi, Atig
    Bhatt, Ravindara
    Ghosh, Soumalya
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 92 - +
  • [24] A scalable representation towards attack graph generation
    Bhattacharya, Somak
    Malhotra, Samresh
    Ghsoh, S. K.
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152
  • [25] A Workflow for Distributed and Resilient Attack Graph Generation
    Palma, Alessandro
    Bonomi, Silvia
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 185 - 187
  • [26] Overview on Attack Graph Generation and Visualization Technology
    Yi, Shengwei
    Peng, Yong
    Xiong, Qi
    Wang, Ting
    Dai, Zhonghua
    Gao, Haihui
    Xu, Junfeng
    Wang, Jiteng
    Xu, Lijuan
    2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [27] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [28] Practical Data-Only Attack Generation
    Johannesmeyer, Brian
    Slowinska, Asia
    Bos, Herbert
    Giuffrida, Cristiano
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 1401 - 1418
  • [29] Practical Data-Only Attack Generation
    Johannesmeyer, Brian
    Slowinska, Asia
    Bos, Herbert
    Giuffrida, Cristiano
    Proceedings of the 33rd USENIX Security Symposium, 2024, : 1401 - 1418
  • [30] KNOWLEDGE BASE DESIGN
    DEBENHAM, JK
    AUSTRALIAN COMPUTER JOURNAL, 1985, 17 (01): : 42 - 48