A Network Security Prediction Method Based on Attack Defense Tree

被引:1
|
作者
Li, Junyi [1 ]
Wu, Yongdong [2 ]
Li, Yang [3 ]
Zhang, Ziwen [4 ]
Fouad, Hassan [5 ]
Altameem, Torki [6 ]
机构
[1] Guangdong Polytech Inst, Dept Engn Technol, Guangzhou 528458, Peoples R China
[2] Ctr Guangzhou Maritime Survey & Mapping, Guangzhou 510320, Peoples R China
[3] Guangdong Univ Technol, Guangzhou 510006, Peoples R China
[4] Guangzhou Maritime Univ, Guangzhou 510725, Peoples R China
[5] Helwan Univ, Biomed Engn Dept, Fac Engn, Helwan 77436, Egypt
[6] King Saud Univ, Comp Sci Dept, CC, Riyadh 11362, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Network Security; Situation Analysis; Attack Behavior Tree; Defense Behavior Tree; GENERALIZED NEURAL-NETWORKS; IMAGE FUSION; EXPONENTIAL STABILITY; DISSIPATIVITY; PERFORMANCE; ALGORITHM; FRAMEWORK; SYSTEM;
D O I
10.1166/jno.2023.3398
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modern networks are vulnerable to coordinated assaults. To perform threat analysis on individual and com-bined attack behaviors, it is essential to establish a security situation analysis model based on offensive and defensive decisions. The standard attack tree model used in this study ignores the impact of defenses, and the defensive tree model is not well scalable. Game theory is introduced into the attack tree model to describe specific network attack and defense event scenarios. First, analyze the logical relationship of different levels of attack behaviors in the network, integrate the offensive and defensive trees corresponding to different levels of attack events, to obtain a complete network offensive and defensive behavior tree, and then build a network offensive and defensive behavior tree model. Second, the basic offensive and defensive behav-ior tree extends from network offensive and defensive behavior, network detection equipment, and network defense measures. Propose an algorithm for the success rate of the attack target and calculate its attack probability. Based on these findings, we assess the potential for an attack and investigate the current state of network defenses. An offensive and defensive behavior tree model based on the BGP (Border Gateway protoc01) attack tree was developed in order to test the viability and efficacy of the network offensive and IP: 203 8 109 20 On: Fri 26 May 2023 2:45:10 defensive behavior tree model. The network attack and defensive beavior tree model brought out in this Copyright: American Scientific Publishers study is capable of performing a wide range of Delivered calculatios. by Ingenta The effect of defensive measures, as well as the ability to add and delete offensive and defensive behaviors at any node, has strong scalability and can provide a scientific basis for decision-making for network managers and operators.
引用
收藏
页码:357 / 366
页数:10
相关论文
共 50 条
  • [1] Quantitative Method for Network Security Situation Based on Attack Prediction
    Hu, Hao
    Zhang, Hongqi
    Liu, Yuling
    Wang, Yongwei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [2] Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
    He, Sui
    Lei, Ding
    Shuang, Wang
    Liu, Chunbo
    Gu, Zhaojun
    [J]. PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 651 - 655
  • [3] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161
  • [5] Edge Network Security Risk Control Based on Attack and Defense Map
    Shi, Lin
    Wang, Zilong
    Zeng, Yixuan
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (03)
  • [6] Research on Optimal Attack and Defense Decision of Network Security Based on Fuzzy Neural Network
    Ye Ru-jun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 317 - 324
  • [7] Network security equipment evaluation based on attack tree with risk fusion
    CHENG Ran
    LU Yue-ming
    [J]. 网络与信息安全学报, 2017, 3 (07) : 70 - 77
  • [8] Policy-tree based proactive defense model for network security
    Zhang, F
    Qin, ZG
    Zhou, SJ
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 437 - 449
  • [9] Neural-network-based hardware trojan attack prediction and security defense mechanism in optical networks-on-chip
    He, Xiangyu
    Guo, Pengxing
    Zhou, Jiahao
    Li, Jingsi
    Zhang, Fan
    Hou, Weigang
    Guo, Lei
    [J]. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2024, 16 (09) : 881 - 893
  • [10] Network Attack Prediction Method Based on Threat Intelligence
    Wang, Junshe
    Yi, Yuzi
    Zhang, Hongbin
    Cao, Ning
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160