An Approach for Security Assessment of Network Configurations using Attack Graph

被引:23
|
作者
Ghosh, Nirnay [1 ]
Ghosh, S. K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
关键词
Network Security; Attack Graph; Security Metric;
D O I
10.1109/NetCoM.2009.83
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With increasing network security threats, the network vulnerability must consider exploits in the context of multi-stage, multi-host attack scenarios. The general approach to this problem is to construct an attack graph for a given network configuration. An attack graph consists of a number of attack paths which are essentially series of exploits which an attacker employs to reach the destination. Each attack path depicts an attack scenario. As the number of attack scenarios increases, the overall security of the network reduces. Thus there is need for quantification of security level of a given network. In this paper, two security metrics, namely probabilistic security metric and attack resistance metric, have been employed to evaluate the relative security levels of various network configurations. A case study has been presented to demonstrate the applicability of the proposed approach.
引用
收藏
页码:283 / 288
页数:6
相关论文
共 50 条
  • [41] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [42] RFID System Security Assessment Methodology Based on Attack Graph Model
    Yang, Xiaoming
    Wang, Jiahao
    Huang, Yifu
    Qin, Zhiguang
    [J]. PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1161 - 1166
  • [43] Analysis of Complex Networks for Security Issues using Attack Graph
    Musa, Tanvirali
    Yeo, Kheng Cher
    Azam, Sarni
    Shanmugam, Bharanidharan
    Karim, Asif
    De Boer, Friso
    Nur, Fernaz Narin
    Faisal, Fahad
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [44] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [45] Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation
    Shin, Gun-Yoon
    Hong, Sung-Sam
    Lee, Jung-Sik
    Han, In-Sung
    Kim, Hwa-Kyung
    Oh, Haeng-Rok
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (14):
  • [46] Improving Attack Graph Visual Syntax Configurations
    Sherzhanov, Askhat
    Atlam, Hany F.
    Azad, Muhammad Ajmal
    Lallie, Harjinder Singh
    [J]. ELECTRONICS, 2024, 13 (15)
  • [47] A Distributed network risk assessment method based on attack graph
    Yang, Tian Chi
    Fang, Ming
    Shao, Qi Feng
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
  • [48] A systematic approach to network security assessment
    Rasti, M
    Sarramy, D
    Khaleghi, M
    [J]. COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2004, : 79 - 84
  • [49] Using network attack graph to predict the future attacks
    Lei, Jie
    Li, Zhi-Tang
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 940 - 944