Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs

被引:1
|
作者
Matthews, Isaac [1 ]
Soudjani, Sadegh [1 ]
Van Moorsel, Aad [1 ]
机构
[1] Newcastle Univ, Sch Comp, Newcastle Upon Tyne, Tyne & Wear, England
来源
关键词
Bayesian attack graph; Vulnerability scan; Stochastic simulation; Intrusion detection; Network security; Probabilistic model; SECURITY RISK;
D O I
10.1007/978-3-030-89137-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A vulnerability scan combined with information about a computer network can be used to create an attack graph, a model of how the elements of a network could be used in an attack to reach specific states or goals in the network. These graphs can be understood probabilistically by turning them into Bayesian attack graphs (BAGs), making it possible to quantitatively analyse the security of large networks. In the event of an attack, probabilities on the graph change depending on the evidence discovered (e.g., by an intrusion detection system or knowledge of a host's activity). Since such scenarios are difficult to solve through direct computation, we discuss three stochastic simulation techniques for updating the probabilities dynamically based on the evidence and compare their speed and accuracy. From our experiments we conclude that likelihood weighting is most efficient for most uses. We also consider sensitivity analysis of BAGs, to identify the most critical nodes for protection of the network and solve the uncertainty problem for the assignment of priors to nodes. Since sensitivity analysis can easily become computationally expensive, we present and demonstrate an efficient sensitivity analysis approach that exploits a quantitative relation with stochastic inference.
引用
收藏
页码:171 / 186
页数:16
相关论文
共 50 条