Defense scheme generation method using mixed path attack graph

被引:1
|
作者
Yu, Yang [1 ]
Xia, Chun-He [1 ]
Hu, Xiao-Yun [1 ]
机构
[1] School of Computer Science and Engineering, Key Laboratory of Beijing Network Technology, Beijing University of Aeronautics and Astronautics, Beijing,100191, China
关键词
Graph theory - Semantics - Network security - Multiobjective optimization;
D O I
10.3785/j.issn.1008-973X.2017.09.009
中图分类号
学科分类号
摘要
The common properties of known vulnerability were discussed; the formal description of vulnerability and its exploiting rule were proposed. A mixed path attack graph (MPAG) model was constructed to extend the description semantic of attack graph. MPAG could describe the hidden attack path introduced by 0-day vulnerability and the explicit one introduced by known vulnerability in the same attack graph. Also, the risk of 0-day vulnerability exploiting ratio was calculated. At last, based on MPAG and multi-objective theory, the method of defense scheme generation was proposed, which could generate defense scheme cost and risk balanced. The experiment shows that MAPG could describe hidden attack path, and new known vulnerabilities, which are not exploited in traditional attack graph, may be introduced in MPAG; the ratio of path cover of defense scheme generated based on MPAG is better, and the method can help the security manager find out the omission of defense measure library. © 2017, Zhejiang University Press. All right reserved.
引用
收藏
页码:1745 / 1759
相关论文
共 50 条
  • [1] A network attack path prediction method using attack graph
    Liu, Xuguang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [2] State Grid Network Attack-defense Graph Generation Method
    Zhou, Cheng
    Fei, Jia-xuan
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398
  • [3] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [4] Attack Intent Analysis Method Based on Attack Path Graph
    Li, Shijin
    Zhu, Minchen
    Qiu, Yanbin
    [J]. ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 27 - 31
  • [5] A method for global attack graph generation
    Man, Dapeng
    Zhang, Bing
    Yang, Wu
    Jin, Wenjin
    Yang, Yongtian
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 236 - +
  • [6] An Attack Path Generation Methods Based on Graph Database
    Yuan, Bintao
    Pan, Zulie
    Shi, Fan
    Li, Zhenhan
    [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1905 - 1910
  • [7] A Generation Method of Attack Graph Based on Evolutionary Computation
    Wang, Jiajia
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
  • [8] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [9] An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
    Wang, Xiaowen
    Huang, Jie
    Qi, Chunyang
    Peng, Yang
    Zhang, Shuaishuai
    [J]. PeerJ Computer Science, 2023, 9
  • [10] An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay
    Wang, Xiaowen
    Huang, Jie
    Qi, Chunyang
    Peng, Yang
    Zhang, Shuaishuai
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9