Analysis of Attack Graph-based Metrics for Quantification of Network Security

被引:0
|
作者
Kundu, Arkadeep [1 ]
Ghosh, Nirnay [1 ]
Chokshi, Ishan [1 ]
Ghosh, Soumya K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computer network has grown both in size and complexity with the advent of Internet. It facilitates easy access to vast store of reference materials, collaborative computing, and information sharing. However, this requires a secure interconnected world of computing where confidentiality, integrity, and availability of information and resources are restored. Traditionally, security mechanism is enforced by access control and authentication. However, these security best practices do not take operating system, or network service-based or application vulnerabilities (programming flaws) into account. With the evolution of sophisticated hacking tools, attackers exploit these vulnerabilities and can gain legitimate access to network resources, bypassing the access control and authentication policies. One tool that presents a succinct representation of different attack scenarios specific to a network is attack graph. Attack graph models service or application-based attacks and depicts all possible multihost multi-step attack scenarios that an attacker can launch to penetrate into an enterprise network. The severity associated with each attack scenario can be evaluated following some attack graph-based security metrics. A good number of security metrics are prevalent in the literature, however, there exists no reported work which determines their efficacy and applicability. In this paper, a survey on attack graph-based metrics has been done and comparative analysis of the existing metrics has been presented to facilitate understanding of a given network's level of security strength. A case study has been perceived for the purpose of analysis.
引用
收藏
页码:530 / 535
页数:6
相关论文
共 50 条
  • [21] Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols
    Dietzel, Stefan
    Petit, Jonathan
    Heijenk, Geert
    Kargl, Frank
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (04) : 1505 - 1518
  • [22] NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks
    Ghosh, Nirnay
    Chokshi, Ishan
    Sarkar, Mithun
    Ghosh, Soumya K.
    Kaushik, Anil Kumar
    Das, Sajal K.
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2015,
  • [23] A Graph-Based Approach for IP Network Analysis
    Velampalli, Sirisha
    Saxena, Ashutosh
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [24] Graph-Based Analysis of Cardiomyocyte Network Connectivity
    Wilson, Alexander J.
    Sands, Gregory
    Ennis, Daniel
    [J]. CIRCULATION, 2021, 144
  • [25] Graph-based analysis of the Bucharest transport network
    Ducoffe, Guillaume
    [J]. ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2024, 34 (01): : 59 - 68
  • [26] A Heuristic Method of Attack Graph Analysis for Network Security Hardening
    Zhao Chao
    Wang Huiqiang
    Guo Fangfang
    Zhou Mo
    Zhang Yushu
    [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
  • [27] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [28] Study of network security evaluation based on attack graph model
    Electronic Engineering Institute, Hefei 230037, China
    不详
    [J]. Tongxin Xuebao, 2007, 3 (29-34):
  • [29] A Quantitative Method for Evaluating Network Security Based on Attack Graph
    Zheng, Yukun
    Lv, Kun
    Hu, Changzhen
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
  • [30] A review on graph-based approaches for network security monitoring and botnet detection
    Sofiane Lagraa
    Martin Husák
    Hamida Seba
    Satyanarayana Vuppala
    Radu State
    Moussa Ouedraogo
    [J]. International Journal of Information Security, 2024, 23 : 119 - 140