Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps

被引:0
|
作者
Diamah, Aodah [1 ]
Mohammadian, Masoud [1 ]
Balachandran, Bala M. [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2606, Australia
关键词
Network security; attack graph; FCM; Genetic Algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When presented with an attack graph, network administrator may raise question on how to harden the network. To defend his network, network administrator should be supplied with list of all attack paths that can compromise the network. With this list, he can decide which paths are worth paying attention to and defending against. In the event of limited resources, network administrator may only be interested in certain critical paths which cause worst network attack. Attack graph alone is not always helpful on its own and needs additional work for this purpose. In this paper we present the use of a Fuzzy Cognitive Map which is converted from attack graph with genetic algorithm to find attack scenarios causing worst impact on network security. The identified scenarios can then help network administrator to mitigate risks associated with the attack scenarios and improve his network security.
引用
收藏
页码:433 / 440
页数:8
相关论文
共 50 条
  • [1] A Generation Method of Network Security Hardening Strategy Based on Attack Graphs
    Zhao, Chao
    Wang, Huiqiang
    Lin, Junyu
    Lv, Hongwu
    Zhang, Yushu
    [J]. INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2015, 12 (01) : 45 - 61
  • [2] RECURRENT METHOD FOR CONSTRUCTING FUZZY COGNITIVE MAPS FOR FOOD SECURITY ASSESSMENT
    Rogachev, Aleksey
    Melikhova, Elena
    Pleschenko, Tatiana
    [J]. INTERNATIONAL JOURNAL FOR QUALITY RESEARCH, 2022, 16 (01) : 111 - 118
  • [3] Applying Attack Graphs to Network Security Metric
    Xie, Anming
    Wen, Weiping
    Zhang, Li
    Hu, Jianbin
    Chen, Zhong
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
  • [4] The Effect Evaluation of the Network Attack Based on the Fuzzy Comprehensive Evaluation Method
    Shi, Zivan
    Zhao, Guolin
    Liu, Jianhao
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 367 - 371
  • [5] A NEW LIGHTWEIGHT METHOD FOR SECURITY RISK ASSESSMENT BASED ON FUZZY COGNITIVE MAPS
    Szwed, Piotr
    Skrzynski, Pawel
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2014, 24 (01) : 213 - 225
  • [6] Application of Fuzzy AHP Method in the Effect Evaluation of Network Attack
    Sun, Zhicheng
    Liu, Mingyuan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23
  • [7] GENERATING NETWORK ATTACK GRAPHS FOR SECURITY ALERT CORRELATION
    Zhang, Shaojun
    Li, Jianhua
    Chen, Xiuzhen
    Fan, Lei
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 220 - 225
  • [8] Toward Measuring Network Security Using Attack Graphs
    Wang, Lingyu
    Singhal, Anoop
    Jajodia, Sushil
    [J]. QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 49 - 54
  • [9] Network Security Situation Evaluation Method Based on Attack Intention Recognition
    Wang Kun
    Qiu Hui
    Yang Haopu
    Hou Di
    [J]. PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 919 - 924
  • [10] A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps
    Fan, Zhijie
    Tan, Chengxiang
    Li, Xin
    [J]. International Journal of Information and Computer Security, 2021, 14 (3-4): : 242 - 262