Heuristic Network Security Risk Based on Attack Graph

被引:1
|
作者
Sun, Wei [1 ]
Li, Qianmu [1 ,2 ]
Wang, Pengchuan [1 ]
Hou, Jun [3 ]
机构
[1] Nanjing Univ Sci & Technol, Nanjing, Peoples R China
[2] Wuyi Univ, Intelligent Mfg Dept, Nanping, Peoples R China
[3] Nanjing Vocat Univ Ind Technol, Sch Social Sci, Nanjing, Peoples R China
来源
CLOUD COMPUTING, CLOUDCOMP 2021 | 2022年 / 430卷
基金
国家重点研发计划;
关键词
Attack graph; Attack paths; Heuristic algorithm; CVE; Cyber security;
D O I
10.1007/978-3-030-99191-3_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of attack technology, attackers prefer to exploit multiple vulnerabilities with a combination of several attacks instead of simply using violent cracking and botnets. In addition, enterprises tend to adopt microservices architectures and multi-cloud environments to obtain high efficiency, high reliability and high scalability. It makes modeling attack scenarios and mapping the actions of potential adversaries an urgent and difficult task. There have been many improvements that can automatically generate attack graphs for complex networks. However, extracting enough effective information from such complex attack graphs is still a problem to be solved. Traditional algorithms can't always accomplish this task because of variable and complex attack graph inputs. In contrast, heuristic algorithms have the advantages of adaptability, self-learning ability, robustness and high efficiency. In this paper, we present heuristic algorithms to complete the analysis of attack graphs, including fusion algorithm of particle swarm optimization (PSO) algorithm and grey wolf optimization (GWO) algorithm for finding the spanning arborescence of maximum weight and improved genetic simulated annealing (GA-SA) algorithm for finding attack path with the biggest risk. Also, we present a method for node importance evaluation based on the interpretive structural modeling (ISM) method. We test our methods on a multi-cloud enterprise network, and the result shows that our methods perform well.
引用
收藏
页码:181 / 194
页数:14
相关论文
共 50 条
  • [1] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [2] A Heuristic Method of Attack Graph Analysis for Network Security Hardening
    Zhao Chao
    Wang Huiqiang
    Guo Fangfang
    Zhou Mo
    Zhang Yushu
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
  • [3] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [4] Evaluation of Network Risk Using Attack Graph Based Security Metrics
    Kumar, Santosh
    Negi, Anuradha
    Prasad, Keshav
    Mahanti, Aniket
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
  • [5] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [6] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [7] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [8] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [9] Multi-agent network security risk assessment research based on attack graph
    Xie, Lixia
    Qiu, Xiaorui
    Zhao, Binbin
    ICIC Express Letters, Part B: Applications, 2015, 6 (10): : 2809 - 2816
  • [10] Study of network security evaluation based on attack graph model
    Electronic Engineering Institute, Hefei 230037, China
    不详
    Tongxin Xuebao, 2007, 3 (29-34):