A Heuristic Method of Attack Graph Analysis for Network Security Hardening

被引:4
|
作者
Zhao Chao [1 ]
Wang Huiqiang [1 ]
Guo Fangfang [1 ]
Zhou Mo [1 ]
Zhang Yushu [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Peoples R China
关键词
vulnerability; attack graph; network security hardening; ant colony optimization;
D O I
10.1109/CyberC.2014.18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional vulnerability scan tools cannot show the associations among vulnerabilities, and thus the security administrators have the difficulty to comprehensively understand the risks in networks according to the vulnerabilities sources. With the number of vulnerabilities growing rapidly, repairing all vulnerabilities costs much. In order to mitigate this problem, we propose a method using attack graph analysis, which provides network security hardening strategies in a cost effective way. For such a purpose, we construct attack graphs by software, and analyze the potential risks in networks by preprocessing them. Further, we calculate low-cost network security hardening strategies via modified ant-colony optimization. In case that the algorithm falls into local optima, a node-hidden mechanism with the highest selected probability is introduced. We have evaluated the performance of the proposed algorithm by simulations. The experimental results show that this method achieves scalability and significantly reduces cost of network security hardening strategies in an acceptable running time.
引用
收藏
页码:43 / 47
页数:5
相关论文
共 50 条
  • [41] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [42] Extending Attack Graph-Based Metrics for Enterprise Network Security Management
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 315 - 325
  • [43] A Distributed network risk assessment method based on attack graph
    Yang, Tian Chi
    Fang, Ming
    Shao, Qi Feng
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
  • [44] Network Security Situation Analysis Aimed at Distributed Attack
    Fu Yanming
    Chen Wen
    Li Lin
    Pan Yanxian
    [J]. MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 1005 - +
  • [45] Cyber attack modeling and simulation for network security analysis
    Kuhl, Michael E.
    Kistner, Jason
    Costantini, Kevin
    Sudit, Moises
    [J]. PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +
  • [46] Compressing Network Attack Surfaces for Practical Security Analysis
    Everson, Douglas
    Cheng, Long
    [J]. 2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021), 2021, : 23 - 29
  • [47] A Network Security Prediction Method Based on Attack Defense Tree
    Li, Junyi
    Wu, Yongdong
    Li, Yang
    Zhang, Ziwen
    Fouad, Hassan
    Altameem, Torki
    [J]. JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (03) : 357 - 366
  • [48] A new method of dynamic network security analysis based on dynamic uncertain causality graph
    Chunling Dong
    Yu Feng
    Wenqian Shang
    [J]. Journal of Cloud Computing, 13
  • [49] A new method of dynamic network security analysis based on dynamic uncertain causality graph
    Dong, Chunling
    Feng, Yu
    Shang, Wenqian
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [50] Quantitative Method for Network Security Situation Based on Attack Prediction
    Hu, Hao
    Zhang, Hongqi
    Liu, Yuling
    Wang, Yongwei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,