Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps

被引:0
|
作者
Diamah, Aodah [1 ]
Mohammadian, Masoud [1 ]
Balachandran, Bala M. [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2606, Australia
关键词
Network security; attack graph; FCM; Genetic Algorithm;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When presented with an attack graph, network administrator may raise question on how to harden the network. To defend his network, network administrator should be supplied with list of all attack paths that can compromise the network. With this list, he can decide which paths are worth paying attention to and defending against. In the event of limited resources, network administrator may only be interested in certain critical paths which cause worst network attack. Attack graph alone is not always helpful on its own and needs additional work for this purpose. In this paper we present the use of a Fuzzy Cognitive Map which is converted from attack graph with genetic algorithm to find attack scenarios causing worst impact on network security. The identified scenarios can then help network administrator to mitigate risks associated with the attack scenarios and improve his network security.
引用
收藏
页码:433 / 440
页数:8
相关论文
共 50 条
  • [31] Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs
    Chen, Feng
    Tu, Ri
    Zhang, Yi
    Su, Jinshu
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 90 - 94
  • [32] Real-Time Risk Assessment of Network Security Based on Attack Graphs
    Yin, Xiaochuan
    Fang, Yan
    Liu, Yibo
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMPUTER APPLICATIONS (ICSA 2013), 2013, 92 : 75 - 80
  • [33] Evaluation of the teaching-learning process with fuzzy cognitive maps
    Laureano-Cruces, AL
    Ramírez-Rodríguez, J
    Terán-Gilmore, A
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA 2004, 2004, 3315 : 922 - 931
  • [34] Performance Evaluation of Practice Courses Using Fuzzy Cognitive Maps
    Albayrak, Ahmet
    Albayrak, Muammer
    [J]. 2016 15TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY BASED HIGHER EDUCATION AND TRAINING (ITHET), 2016,
  • [35] A situation awareness assessment method based on fuzzy cognitive maps
    Chen Jun
    Gao Xudong
    Rong Jia
    Gao Xiaoguang
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2022, 33 (05) : 1108 - 1122
  • [36] A new method for reaching equilibrium points in fuzzy cognitive maps
    Kottas, TL
    Boutalis, YS
    Devedzic, G
    Mertzios, BG
    [J]. 2004 2ND INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 53 - 60
  • [37] A situation awareness assessment method based on fuzzy cognitive maps
    CHEN Jun
    GAO Xudong
    RONG Jia
    GAO Xiaoguang
    [J]. Journal of Systems Engineering and Electronics, 2022, 33 (05) : 1108 - 1122
  • [38] A new quantitative method for simplifying complex fuzzy cognitive maps
    Obiedat, Mamoon
    Al-yousef, Ali
    Banikhalaf, Mustafa
    Al Talafha, Khairallah
    [J]. INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2020, 12 (04) : 415 - 427
  • [39] A divide and conquer method for learning large Fuzzy Cognitive Maps
    Stach, Wojciech
    Kurgan, Lukasz
    Pedrycz, Witold
    [J]. FUZZY SETS AND SYSTEMS, 2010, 161 (19) : 2515 - 2532
  • [40] A METHOD OF SECURITY EVALUATION BASED ON FUZZY MATHEMATICS
    Lu, Guo-Ming
    Chen, Zhi-Hong
    He, Xue-Zhi
    Li, Jian-Ping
    [J]. 2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 106 - 109