Analysis of Attack Graph-based Metrics for Quantification of Network Security

被引:0
|
作者
Kundu, Arkadeep [1 ]
Ghosh, Nirnay [1 ]
Chokshi, Ishan [1 ]
Ghosh, Soumya K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computer network has grown both in size and complexity with the advent of Internet. It facilitates easy access to vast store of reference materials, collaborative computing, and information sharing. However, this requires a secure interconnected world of computing where confidentiality, integrity, and availability of information and resources are restored. Traditionally, security mechanism is enforced by access control and authentication. However, these security best practices do not take operating system, or network service-based or application vulnerabilities (programming flaws) into account. With the evolution of sophisticated hacking tools, attackers exploit these vulnerabilities and can gain legitimate access to network resources, bypassing the access control and authentication policies. One tool that presents a succinct representation of different attack scenarios specific to a network is attack graph. Attack graph models service or application-based attacks and depicts all possible multihost multi-step attack scenarios that an attacker can launch to penetrate into an enterprise network. The severity associated with each attack scenario can be evaluated following some attack graph-based security metrics. A good number of security metrics are prevalent in the literature, however, there exists no reported work which determines their efficacy and applicability. In this paper, a survey on attack graph-based metrics has been done and comparative analysis of the existing metrics has been presented to facilitate understanding of a given network's level of security strength. A case study has been perceived for the purpose of analysis.
引用
收藏
页码:530 / 535
页数:6
相关论文
共 50 条
  • [41] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [42] A Probabilistic Computing Approach of Attack Graph-Based Nodes in Large-scale Network
    Ye Yun
    Xu Xi-shan
    Qi Zhi-chang
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY ESIAT 2011, VOL 10, PT A, 2011, 10 : 3 - 8
  • [43] CVSS-based Security Metrics for Quantitative Analysis Of Attack Graphs
    Keramati, Matjan
    Akbari, Ahmad
    Keramati, Mahsa
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 178 - 183
  • [44] A directed graph-based authentication protocol model and its security analysis
    Xie Hong-bo
    Wu Yuan-chen
    Zhou Ming-tian
    [J]. FCST 2006: JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2006, : 89 - +
  • [45] Graph-based relational learning with application to security
    Holder, L
    Cook, D
    Coble, J
    Mukherjee, M
    [J]. FUNDAMENTA INFORMATICAE, 2005, 66 (1-2) : 83 - 101
  • [46] Graph-based Brain Network Analysis in Epilepsy: an EEG Study
    Hu, Yuejing
    Zhang, Qizhong
    Li, Rihui
    Potter, Thomas
    Zhang, Yingchun
    [J]. 2019 9TH INTERNATIONAL IEEE/EMBS CONFERENCE ON NEURAL ENGINEERING (NER), 2019, : 130 - 133
  • [47] A graph-based methodology for analyzing IP spoofing attack
    Santiraveewan, V
    Permpoontanalarp, Y
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 227 - 230
  • [48] Enhancing Graph-based Automated DoS Attack Response
    Klein, Gabriel
    Jahnke, Marko
    Toelle, Jens
    Martini, Peter
    [J]. THE VIRTUAL BATTLEFIELD: PERSPECTIVES ON CYBER WARFARE, 2009, 3 : 249 - +
  • [49] GRAPH-BASED KINSHIP REASONING NETWORK
    Li, Wanhua
    Zhang, Yingqiang
    Lv, Kangchen
    Lu, Jiwen
    Feng, Jianjiang
    Zhou, Jie
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2020,
  • [50] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910