A Heuristic Method of Attack Graph Analysis for Network Security Hardening

被引:4
|
作者
Zhao Chao [1 ]
Wang Huiqiang [1 ]
Guo Fangfang [1 ]
Zhou Mo [1 ]
Zhang Yushu [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Peoples R China
关键词
vulnerability; attack graph; network security hardening; ant colony optimization;
D O I
10.1109/CyberC.2014.18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional vulnerability scan tools cannot show the associations among vulnerabilities, and thus the security administrators have the difficulty to comprehensively understand the risks in networks according to the vulnerabilities sources. With the number of vulnerabilities growing rapidly, repairing all vulnerabilities costs much. In order to mitigate this problem, we propose a method using attack graph analysis, which provides network security hardening strategies in a cost effective way. For such a purpose, we construct attack graphs by software, and analyze the potential risks in networks by preprocessing them. Further, we calculate low-cost network security hardening strategies via modified ant-colony optimization. In case that the algorithm falls into local optima, a node-hidden mechanism with the highest selected probability is introduced. We have evaluated the performance of the proposed algorithm by simulations. The experimental results show that this method achieves scalability and significantly reduces cost of network security hardening strategies in an acceptable running time.
引用
收藏
页码:43 / 47
页数:5
相关论文
共 50 条
  • [21] Exploring attack graph for cost-benefit security hardening: A probabilistic approach
    Wang, Shuzhen
    Zhang, Zonghua
    Kadobayashi, Youki
    [J]. COMPUTERS & SECURITY, 2013, 32 : 158 - 169
  • [22] Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph
    Dai, Fangfang
    Zheng, Kangfeng
    Binwu
    Luo, Shoushan
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1920 - 1937
  • [23] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
  • [24] A network attack path prediction method using attack graph
    Liu, Xuguang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [25] Analysis of Network Attack Technologies and Network Security
    Pei, Xu
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 111 - 114
  • [26] ENHANCING INDUSTRIAL CONTROL NETWORK SECURITY THROUGH VULNERABILITY DETECTION AND ATTACK GRAPH ANALYSIS
    Liao, Yan
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 65 - 74
  • [27] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [28] An Approach for Security Assessment of Network Configurations using Attack Graph
    Ghosh, Nirnay
    Ghosh, S. K.
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 283 - 288
  • [29] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [30] Hardening Network Security
    Marks, Larry
    [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (4-5): : 261 - 262