Heuristic Network Security Risk Based on Attack Graph

被引:1
|
作者
Sun, Wei [1 ]
Li, Qianmu [1 ,2 ]
Wang, Pengchuan [1 ]
Hou, Jun [3 ]
机构
[1] Nanjing Univ Sci & Technol, Nanjing, Peoples R China
[2] Wuyi Univ, Intelligent Mfg Dept, Nanping, Peoples R China
[3] Nanjing Vocat Univ Ind Technol, Sch Social Sci, Nanjing, Peoples R China
来源
CLOUD COMPUTING, CLOUDCOMP 2021 | 2022年 / 430卷
基金
国家重点研发计划;
关键词
Attack graph; Attack paths; Heuristic algorithm; CVE; Cyber security;
D O I
10.1007/978-3-030-99191-3_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of attack technology, attackers prefer to exploit multiple vulnerabilities with a combination of several attacks instead of simply using violent cracking and botnets. In addition, enterprises tend to adopt microservices architectures and multi-cloud environments to obtain high efficiency, high reliability and high scalability. It makes modeling attack scenarios and mapping the actions of potential adversaries an urgent and difficult task. There have been many improvements that can automatically generate attack graphs for complex networks. However, extracting enough effective information from such complex attack graphs is still a problem to be solved. Traditional algorithms can't always accomplish this task because of variable and complex attack graph inputs. In contrast, heuristic algorithms have the advantages of adaptability, self-learning ability, robustness and high efficiency. In this paper, we present heuristic algorithms to complete the analysis of attack graphs, including fusion algorithm of particle swarm optimization (PSO) algorithm and grey wolf optimization (GWO) algorithm for finding the spanning arborescence of maximum weight and improved genetic simulated annealing (GA-SA) algorithm for finding attack path with the biggest risk. Also, we present a method for node importance evaluation based on the interpretive structural modeling (ISM) method. We test our methods on a multi-cloud enterprise network, and the result shows that our methods perform well.
引用
收藏
页码:181 / 194
页数:14
相关论文
共 50 条
  • [31] Edge Network Security Risk Control Based on Attack and Defense Map
    Shi, Lin
    Wang, Zilong
    Zeng, Yixuan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (03)
  • [32] Network security equipment evaluation based on attack tree with risk fusion
    CHENG Ran
    LU Yue-ming
    网络与信息安全学报, 2017, 3 (07) : 70 - 77
  • [33] An Attack Graph Generation Method Based on Heuristic Searching Strategy
    Wang, Shuo
    Tang, Guangming
    Kou, Guang
    Chao, Yong
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1180 - 1185
  • [34] An Approach for Security Assessment of Network Configurations using Attack Graph
    Ghosh, Nirnay
    Ghosh, S. K.
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 283 - 288
  • [35] Optimal Network Security Hardening Using Attack Graph Games
    Durkota, Karel
    Lisy, Viliam
    Bosansky, Branislav
    Kiekintveld, Christopher
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 526 - 532
  • [36] Attack Graph Based Security Metrics for Dynamic Networks
    Gain, Ayan
    Barik, Mridul Sankar
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 109 - 128
  • [37] An attack graph-based probabilistic security metric
    Wang, Lingyu
    Islam, Tania
    Long, Tao
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
  • [38] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
  • [39] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [40] Approach of goal-oriented attack graph-based threat evaluation for network security
    Liu, Wei-Xin
    Zheng, Kang-Feng
    Hu, Ying
    Wu, Bin
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (01): : 82 - 86