Bayesian network based weighted APT attack paths modeling in cloud computing

被引:33
|
作者
Zirnba, Aaron [1 ]
Chen, Hongsong [1 ]
Wang, Zhaoshun [1 ]
机构
[1] Univ Sci & Technol Beijing, Dept Comp Sci & Technol, Beijing 100083, Peoples R China
关键词
Attack path; Advanced persistent threats; Cloud computing; Bayesian attack network; Exploit; Vulnerability;
D O I
10.1016/j.future.2019.02.045
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security vulnerabilities exhibited in cloud computing components and technologies not limited to hypervisors, virtual machines, and virtualization present a major security concern. The primary challenge has been to characterize interlinked attack paths generated by Advanced Persistent Thereat (APT) attackers upon exploitation of vulnerabilities exhibited in cloud components. We propose a Bayesian network based weighted attack paths modeling technique to model these attack paths. In our approach, we employ quantitative induction to express weighted attack paths. We chain marginal and conditional probabilities together to characterize multiple attack paths from the attack source to the target node. In so doing, we evaluate the likelihood of an APT occurring in a given path. Furthermore, we propose an optimized algorithm to find the shortest attack path from multiple sources based on key nodes and key edges. The algorithm not only finds the shortest path but also resolves any existing ties amongst paths of equal weights. We characterize the attack time expense of the APT attack by modeling the associated atomic attack events in a path as Poisson variables obeying the Erlang distribution. The attack time expense is classified into three different levels: High, Medium and Low. We use the WannaCry ransomware attack to evaluate our model. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:525 / 537
页数:13
相关论文
共 50 条
  • [1] Ontology based APT Attack Behavior Analysis in Cloud Computing
    Choi, Junho
    Choi, Chang
    Lynn, Htet Myet
    Kim, Pankoo
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 375 - 379
  • [2] Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks
    Laisen Nie
    Dingde Jiang
    Zhihan Lv
    Annals of Telecommunications, 2017, 72 : 297 - 305
  • [3] Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks
    Nie, Laisen
    Jiang, Dingde
    Lv, Zhihan
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (5-6) : 297 - 305
  • [4] Cloud Computing System Scheduling Model Based On Bayesian Network
    YangHong
    YangLi
    LvFeng
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 1122 - 1126
  • [5] BAN: Predicting APT Attack Based on Bayesian Network With MITRE ATT&CK Framework
    Kim, Youngjoon
    Lee, Insup
    Kwon, Hyuk
    Lee, Kyeongsik
    Yoon, Jiwon
    IEEE ACCESS, 2023, 11 : 91949 - 91968
  • [6] A novel approach for APT attack detection based on an advanced computing
    Xuan, Cho Do
    Nguyen, Tung Thanh
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [7] Dynamic Bayesian network based prediction of performance parameters in cloud computing
    Bharti, Priyanka
    Ranjan, Rajeev
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (04) : 368 - 381
  • [9] Bayesian-Poisson Based Modeling of Cyber Attacks in Cloud Computing Networks
    Zimba, Aaron
    Wang, Zhaoshun
    Chen, Hongsong
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 316 - 320
  • [10] Bayesian Classifier and Snort based Network Intrusion Detection System in Cloud Computing
    Modi, Chirag N.
    Patel, Dhiren R.
    Patel, Avi
    Muttukrishnan, Rajarajan
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,