Heuristic Network Security Risk Based on Attack Graph

被引:1
|
作者
Sun, Wei [1 ]
Li, Qianmu [1 ,2 ]
Wang, Pengchuan [1 ]
Hou, Jun [3 ]
机构
[1] Nanjing Univ Sci & Technol, Nanjing, Peoples R China
[2] Wuyi Univ, Intelligent Mfg Dept, Nanping, Peoples R China
[3] Nanjing Vocat Univ Ind Technol, Sch Social Sci, Nanjing, Peoples R China
来源
CLOUD COMPUTING, CLOUDCOMP 2021 | 2022年 / 430卷
基金
国家重点研发计划;
关键词
Attack graph; Attack paths; Heuristic algorithm; CVE; Cyber security;
D O I
10.1007/978-3-030-99191-3_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of attack technology, attackers prefer to exploit multiple vulnerabilities with a combination of several attacks instead of simply using violent cracking and botnets. In addition, enterprises tend to adopt microservices architectures and multi-cloud environments to obtain high efficiency, high reliability and high scalability. It makes modeling attack scenarios and mapping the actions of potential adversaries an urgent and difficult task. There have been many improvements that can automatically generate attack graphs for complex networks. However, extracting enough effective information from such complex attack graphs is still a problem to be solved. Traditional algorithms can't always accomplish this task because of variable and complex attack graph inputs. In contrast, heuristic algorithms have the advantages of adaptability, self-learning ability, robustness and high efficiency. In this paper, we present heuristic algorithms to complete the analysis of attack graphs, including fusion algorithm of particle swarm optimization (PSO) algorithm and grey wolf optimization (GWO) algorithm for finding the spanning arborescence of maximum weight and improved genetic simulated annealing (GA-SA) algorithm for finding attack path with the biggest risk. Also, we present a method for node importance evaluation based on the interpretive structural modeling (ISM) method. We test our methods on a multi-cloud enterprise network, and the result shows that our methods perform well.
引用
收藏
页码:181 / 194
页数:14
相关论文
共 50 条
  • [21] Extending Attack Graph-Based Metrics for Enterprise Network Security Management
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 315 - 325
  • [22] Research on the Construction of Network Security Attack Detection Model Based on Knowledge Graph
    Qin, Lina
    2024 IEEE 4th International Conference on Electronic Technology, Communication and Information, ICETCI 2024, 2024, : 596 - 603
  • [23] Analytical Approach to Attack Graph Analysis for Network Security
    Kijsanayothin, Phongphun
    Hewett, Rattikorn
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 25 - 32
  • [24] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [25] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    ELECTRONICS, 2022, 11 (09)
  • [26] Exploring risk flow attack graph for security risk assessment
    Dai, Fangfang
    Hu, Ying
    Zheng, Kangfeng
    Wu, Bin
    IET INFORMATION SECURITY, 2015, 9 (06) : 344 - 353
  • [27] Network security risk analysis based on graph theoretical methods
    Lin, Zefu
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 510 - 516
  • [28] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [29] Dynamic Network Security Situation Prediction based on Bayesian Attack Graph and Big Data
    Lin, Pengwen
    Chen, Yonghong
    PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 992 - 998
  • [30] Sensor network security defense strategy based on attack graph and improved binary PSO
    Dong, Chaoxian
    Zhao, Lixin
    SAFETY SCIENCE, 2019, 117 : 81 - 87