A Novel Method for Host Risk Assessment Based on Predecessor Attack

被引:0
|
作者
Zhang, Xiao-song [1 ]
Huang, Lei [1 ]
Xu, Chun-xiang [1 ]
Chen, Ting [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Engn & Comp Sci, Chengdu 611731, Peoples R China
关键词
network security; vulnerability; host risk assessment; predecessor attack;
D O I
10.1117/12.913276
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is universally admitted that propagable attacks pose a more serious threat to network than a single attack. And the propagation of attacks mainly depends on vulnerabilities. Popular vulnerabilities assessment tools are able to detect hosts' vulnerabilities in detail and produce the related reports. However they always ignore the threats led by predecessor attacks from other hosts in the network, because they do not take the network conditions into consideration. In this paper, digraph is used to generate the attack paths by virtue of network and vulnerabilities information. And according to the attacks relationship of hosts, the risk of predecessor attack is considered for the general risk calculation of target hosts. A method is presented to assess the risk of hosts in network environment qualitatively and quantitatively.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] A novel LDoS attack detection method based on reconstruction anomaly
    Tang, Dan
    Yan, Yudong
    Dai, Rui
    Qin, Zheng
    Chen, Jingwen
    Zhang, Dongshuo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (02): : 1373 - 1392
  • [32] A novel LDoS attack detection method based on reconstruction anomaly
    Dan Tang
    Yudong Yan
    Rui Dai
    Zheng Qin
    Jingwen Chen
    Dongshuo Zhang
    Cluster Computing, 2022, 25 : 1373 - 1392
  • [33] Novel Imperceptible Watermarking Attack Method Based on Residual Learning
    Li Q.
    Wang C.-P.
    Wang X.-Y.
    Li J.
    Xia Z.-Q.
    Gao S.
    Ma B.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (09): : 4351 - 4361
  • [34] Risk assessment method of power plant industrial control information security based on Bayesian attack graph Systems
    Xie, Jianbo
    Sun, Keda
    Lei, Xubing
    JOURNAL OF ELECTRICAL SYSTEMS, 2021, 17 (04) : 529 - 541
  • [35] A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
    Liu, Donghang
    Dong, Lihua
    Lv, Shaoqing
    Dong, Ying
    He, Fannv
    Wu, Chensi
    Zhang, Yuqing
    Ma, Hua
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 450 - 463
  • [36] Risk Assessment of Cyber Attacks in ECPS Based on Attack Tree and AHP
    Ru, Yeqi
    Wang, Yufei
    Li, June
    Liu, Jian
    Yang, Guotai
    Yuan, Kai
    Liu, Kaipei
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 465 - 470
  • [37] A novel intelligent assessment method for SCADA information security risk based on causality analysis
    Li Yang
    Xiedong Cao
    Xinyu Geng
    Cluster Computing, 2019, 22 : 5491 - 5503
  • [38] Airway triage: a novel application-based method for airway assessment and risk stratification
    Huitink, Johannes M.
    BRITISH JOURNAL OF ANAESTHESIA, 2024, 132 (05) : 987 - 990
  • [39] A novel intelligent assessment method for SCADA information security risk based on causality analysis
    Yang, Li
    Cao, Xiedong
    Geng, Xinyu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S5491 - S5503
  • [40] Food quality and safety risk assessment using a novel HMM method based on GRA
    Han, Yongming
    Cui, Shiying
    Geng, Zhiqiang
    Chu, Chong
    Chen, Kai
    Wang, Yajie
    FOOD CONTROL, 2019, 105 : 180 - 189