A Heuristic Method of Attack Graph Analysis for Network Security Hardening

被引:4
|
作者
Zhao Chao [1 ]
Wang Huiqiang [1 ]
Guo Fangfang [1 ]
Zhou Mo [1 ]
Zhang Yushu [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Peoples R China
关键词
vulnerability; attack graph; network security hardening; ant colony optimization;
D O I
10.1109/CyberC.2014.18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional vulnerability scan tools cannot show the associations among vulnerabilities, and thus the security administrators have the difficulty to comprehensively understand the risks in networks according to the vulnerabilities sources. With the number of vulnerabilities growing rapidly, repairing all vulnerabilities costs much. In order to mitigate this problem, we propose a method using attack graph analysis, which provides network security hardening strategies in a cost effective way. For such a purpose, we construct attack graphs by software, and analyze the potential risks in networks by preprocessing them. Further, we calculate low-cost network security hardening strategies via modified ant-colony optimization. In case that the algorithm falls into local optima, a node-hidden mechanism with the highest selected probability is introduced. We have evaluated the performance of the proposed algorithm by simulations. The experimental results show that this method achieves scalability and significantly reduces cost of network security hardening strategies in an acceptable running time.
引用
收藏
页码:43 / 47
页数:5
相关论文
共 50 条
  • [1] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    [J]. CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [2] Optimal Network Security Hardening Using Attack Graph Games
    Durkota, Karel
    Lisy, Viliam
    Bosansky, Branislav
    Kiekintveld, Christopher
    [J]. PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 526 - 532
  • [3] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [4] Analytical Approach to Attack Graph Analysis for Network Security
    Kijsanayothin, Phongphun
    Hewett, Rattikorn
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 25 - 32
  • [5] A Quantitative Method for Evaluating Network Security Based on Attack Graph
    Zheng, Yukun
    Lv, Kun
    Hu, Changzhen
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
  • [6] Optimal Security Hardening over a Probabilistic Attack Graph
    Buczkowski, Przemyslaw
    Malacaria, Pasquale
    Hankin, Chris
    Fielder, Andrew
    [J]. SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 21 - 30
  • [7] A Generation Method of Network Security Hardening Strategy Based on Attack Graphs
    Zhao, Chao
    Wang, Huiqiang
    Lin, Junyu
    Lv, Hongwu
    Zhang, Yushu
    [J]. INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2015, 12 (01) : 45 - 61
  • [8] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [9] IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in aWeighted Attack Graph
    Wan, Yinxin
    Lin, Xuanli
    Sabur, Abdulhakim
    Chang, Alena
    Xu, Kuai
    Xue, Guoliang
    [J]. PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 315 - 326
  • [10] Exploiting Domination in Attack Graph for Enterprise Network Hardening
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 342 - 353