Design Procedure of Knowledge Base for Practical Attack Graph Generation

被引:13
|
作者
Inokuchi, Masaki [1 ]
Ohta, Yoshinobu [1 ]
Kinoshita, Shunichi [1 ]
Yagyu, Tomohiko [1 ]
Stan, Orly [2 ]
Bitton, Ron [2 ]
Elovici, Yuval [2 ]
Shabtai, Asaf [2 ]
机构
[1] NEC Corp Ltd, Secur Res Labs, Tokyo, Japan
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
关键词
Risk assessment; Attack graph; Knowledge base; Design procedure;
D O I
10.1145/3321705.3329853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security assessment is an essential activity for understanding the security risks in an enterprise environment. While many tools have been developed in order to evaluate the security risks for individual hosts, it is still a challenge to identify multi-hop cyber security risks in a large-scale environment. An attack graph, which provides a comprehensive view of attacks, assists in identifying high-risk attack paths and efficiently deploying countermeasures. Several frameworks which generate an attack graph from system information and knowledge base have also been developed in the past. Although these tools are widely adopted, their expression capabilities are insufficient. The expansion of knowledge base is needed to handle comprehensive attack scenario. In this research, we developed an attack graph generation system by extending the MulVAL framework which is widely adopted due to its high extensibility. We designed and implemented knowledge base (also known as "interaction rules" in the MulVAL framework) for practical attack graph generation. A structured design procedure is necessary to construct a knowledge base that enables comprehensive analysis, which is highly important for actual risk assessment. We describe the design procedure, design considerations and implementation of our rule set. Additionally, we demonstrate the improvement to the generated attack graph by the implemented rules in a case study.
引用
收藏
页码:594 / 601
页数:8
相关论文
共 50 条
  • [31] A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
    Jia, Yan
    Qi, Yulu
    Shang, Huaijun
    Jiang, Rong
    Li, Aiping
    ENGINEERING, 2018, 4 (01) : 53 - 60
  • [32] Knowledge graph with deep reinforcement learning for intelligent generation of machining process design
    Hua, Yiwei
    Wang, Ru
    Wang, Zuoxu
    Wang, Guoxin
    Yan, Yan
    JOURNAL OF ENGINEERING DESIGN, 2024,
  • [33] A Practical Framework for Evaluating the Quality of Knowledge Graph
    Chen, Haihua
    Cao, Gaohui
    Chen, Jiangping
    Ding, Junhua
    KNOWLEDGE GRAPH AND SEMANTIC COMPUTING: KNOWLEDGE COMPUTING AND LANGUAGE UNDERSTANDING, 2019, 1134 : 111 - 122
  • [34] Data Poisoning Attack against Knowledge Graph Embedding
    Zhang, Hengtong
    Zheng, Tianhang
    Gao, Jing
    Miao, Chenglin
    Su, Lu
    Li, Yaliang
    Ren, Kui
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4853 - 4859
  • [35] Staged query graph generation based on answer type for question answering over knowledge base
    Chen, Haoyuan
    Ye, Fei
    Fan, Yuankai
    He, Zhenying
    Jing, Yinan
    Zhang, Kai
    Wang, X. Sean
    KNOWLEDGE-BASED SYSTEMS, 2022, 253
  • [36] Building a Knowledge Base of Bridge Maintenance Using Knowledge Graph
    Zhang, Yang
    Liu, Jia
    Hou, Kepeng
    ADVANCES IN CIVIL ENGINEERING, 2023, 2023
  • [37] Feature Generation Based on Knowledge Graph
    Li, Li
    Yang, Haolin
    Jiao, Yueming
    Lin, Kuo-Yi
    IFAC PAPERSONLINE, 2020, 53 (05): : 774 - 779
  • [38] An Attack Path Generation Methods Based on Graph Database
    Yuan, Bintao
    Pan, Zulie
    Shi, Fan
    Li, Zhenhan
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1905 - 1910
  • [39] Attack Graph Generation, Visualization and Analysis: Issues and Challenges
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 379 - 390
  • [40] A Generation Method of Attack Graph Based on Evolutionary Computation
    Wang, Jiajia
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31