A network attack path prediction method using attack graph

被引:11
|
作者
Liu, Xuguang [1 ]
机构
[1] Anhui Commun Vocat & Tech Coll, Dept Urban Rail Transit & Informat Engn, Hefei 230051, Anhui, Peoples R China
关键词
Network attack path; Wireless network; Attack path map; Abnormal information human invasion; Yebeisi reasoning; Detection method; NEURAL-NETWORK; ALGORITHM;
D O I
10.1007/s12652-020-02206-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The prediction of intrusion intention of abnormal information in wireless network can effectively guarantee the security and stability of network. Traditional methods describe the relationship between different types of attacks. When building the model, only the path of the network nodes involved in the current attack behavior is considered, so the vulnerability of the network can not be analyzed in detail. Then, a network attack node path detection model based on attack graph is proposed. Firstly, according to the theory of attack graph, the network attack graph is defined, the right state of attacker is detected, the connection matrix of network is obtained, and the formal description of vulnerability, attack effect and attack premise is obtained. Then, the attack path graph is used to describe the transfer relationship between nodes, map the process of the attack from one host or vulnerability to the next host or vulnerability, and give the shortest path to achieve the attack intention. Further obtain the maximum possibility of intrusion under each attack path of the network, and build a network attack node path detection model based on the detection results. The experimental results show that the proposed model has high accuracy and effectively improves the efficiency of network security analysis.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Attack Intent Analysis Method Based on Attack Path Graph
    Li, Shijin
    Zhu, Minchen
    Qiu, Yanbin
    [J]. ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 27 - 31
  • [2] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
  • [3] Research on network attack analysis method based on attack graph of absorbing Markov chain
    Kang, Haiyan
    Long, Molan
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 122 - 135
  • [4] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [5] Prediction of network attack profit path based on NAPG model
    Liu Kun
    Wang Hui
    Shen Zihao
    [J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27 (05) : 91 - 102
  • [6] Prediction of network attack profit path based on NAPG model
    Kun, Liu
    Hui, Wang
    Zihao, Shen
    [J]. Journal of China Universities of Posts and Telecommunications, 2020, 27 (05): : 91 - 102
  • [7] A highly scalable model for network attack identification and path prediction
    Nanda, Sanjeeb
    Deo, Narsingh
    [J]. PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 663 - 668
  • [8] Using network attack graph to predict the future attacks
    Lei, Jie
    Li, Zhi-Tang
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 940 - 944
  • [9] A Quantitative Method for Evaluating Network Security Based on Attack Graph
    Zheng, Yukun
    Lv, Kun
    Hu, Changzhen
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
  • [10] A Heuristic Method of Attack Graph Analysis for Network Security Hardening
    Zhao Chao
    Wang Huiqiang
    Guo Fangfang
    Zhou Mo
    Zhang Yushu
    [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47