Design Procedure of Knowledge Base for Practical Attack Graph Generation

被引:12
|
作者
Inokuchi, Masaki [1 ]
Ohta, Yoshinobu [1 ]
Kinoshita, Shunichi [1 ]
Yagyu, Tomohiko [1 ]
Stan, Orly [2 ]
Bitton, Ron [2 ]
Elovici, Yuval [2 ]
Shabtai, Asaf [2 ]
机构
[1] NEC Corp Ltd, Secur Res Labs, Tokyo, Japan
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
关键词
Risk assessment; Attack graph; Knowledge base; Design procedure;
D O I
10.1145/3321705.3329853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security assessment is an essential activity for understanding the security risks in an enterprise environment. While many tools have been developed in order to evaluate the security risks for individual hosts, it is still a challenge to identify multi-hop cyber security risks in a large-scale environment. An attack graph, which provides a comprehensive view of attacks, assists in identifying high-risk attack paths and efficiently deploying countermeasures. Several frameworks which generate an attack graph from system information and knowledge base have also been developed in the past. Although these tools are widely adopted, their expression capabilities are insufficient. The expansion of knowledge base is needed to handle comprehensive attack scenario. In this research, we developed an attack graph generation system by extending the MulVAL framework which is widely adopted due to its high extensibility. We designed and implemented knowledge base (also known as "interaction rules" in the MulVAL framework) for practical attack graph generation. A structured design procedure is necessary to construct a knowledge base that enables comprehensive analysis, which is highly important for actual risk assessment. We describe the design procedure, design considerations and implementation of our rule set. Additionally, we demonstrate the improvement to the generated attack graph by the implemented rules in a case study.
引用
收藏
页码:594 / 601
页数:8
相关论文
共 50 条
  • [1] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [2] Strategies for Practical Hybrid Attack Graph Generation and Analysis
    Li, Ming
    Hawrylak, Peter
    Hale, John
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):
  • [3] Knowledge Base Modeling and Design Procedure
    Burita, Ladislav
    Do, Petr
    Ondryhal, Vojtech
    [J]. INFORMATION MODELLING AND KNOWLEDGE BASES XXIII, 2012, 237 : 331 - 343
  • [4] Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
    Kaiser, Florian Klaus
    Dardik, Uriel
    Elitzur, Aviad
    Zilberman, Polina
    Daniel, Nir
    Wiens, Marcus
    Schultmann, Frank
    Elovici, Yuval
    Puzis, Rami
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4793 - 4809
  • [5] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532
  • [6] Automatic Generation of Attack Strategy for Multiple Vulnerabilities Based on Domain Knowledge Graph
    Chen, Xiaosheng
    Shen, Wendi
    Yang, Genke
    [J]. IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [7] Concurrency Strategies for Attack Graph Generation
    Li, Ming
    Hawrylak, Peter J.
    Hale, John
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 174 - 179
  • [8] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567
  • [9] A method for global attack graph generation
    Man, Dapeng
    Zhang, Bing
    Yang, Wu
    Jin, Wenjin
    Yang, Yongtian
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 236 - +
  • [10] Attack Graph Generation for Microservice Architecture
    Ibrahim, Amjad
    Bozhinoski, Stevica
    Pretschner, Alexander
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1235 - 1242