Design Procedure of Knowledge Base for Practical Attack Graph Generation

被引:13
|
作者
Inokuchi, Masaki [1 ]
Ohta, Yoshinobu [1 ]
Kinoshita, Shunichi [1 ]
Yagyu, Tomohiko [1 ]
Stan, Orly [2 ]
Bitton, Ron [2 ]
Elovici, Yuval [2 ]
Shabtai, Asaf [2 ]
机构
[1] NEC Corp Ltd, Secur Res Labs, Tokyo, Japan
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
关键词
Risk assessment; Attack graph; Knowledge base; Design procedure;
D O I
10.1145/3321705.3329853
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security assessment is an essential activity for understanding the security risks in an enterprise environment. While many tools have been developed in order to evaluate the security risks for individual hosts, it is still a challenge to identify multi-hop cyber security risks in a large-scale environment. An attack graph, which provides a comprehensive view of attacks, assists in identifying high-risk attack paths and efficiently deploying countermeasures. Several frameworks which generate an attack graph from system information and knowledge base have also been developed in the past. Although these tools are widely adopted, their expression capabilities are insufficient. The expansion of knowledge base is needed to handle comprehensive attack scenario. In this research, we developed an attack graph generation system by extending the MulVAL framework which is widely adopted due to its high extensibility. We designed and implemented knowledge base (also known as "interaction rules" in the MulVAL framework) for practical attack graph generation. A structured design procedure is necessary to construct a knowledge base that enables comprehensive analysis, which is highly important for actual risk assessment. We describe the design procedure, design considerations and implementation of our rule set. Additionally, we demonstrate the improvement to the generated attack graph by the implemented rules in a case study.
引用
收藏
页码:594 / 601
页数:8
相关论文
共 50 条
  • [41] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    ELECTRONICS, 2022, 11 (09)
  • [42] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56
  • [43] Depth-first method for attack graph generation
    Information Security Research Center, Harbin Engineering University, Harbin 150001, China
    不详
    Jilin Daxue Xuebao (Gongxueban), 2009, 2 (446-452):
  • [44] Identifying Interdependencies Using Attack Graph Generation Methods
    Lever, Kirsty E.
    Kifayat, Kashif
    Merabti, Madjid
    2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 80 - 85
  • [45] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [46] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [47] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660
  • [48] Towards Practical Open Knowledge Base Canonicalization
    Wu, Tien-Hsuan
    Wu, Zhiyong
    Kao, Ben
    Yin, Pengcheng
    CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 883 - 892
  • [49] Practical propositional knowledge base revision algorithm
    Tao Xuehong
    Sun Wei
    Ma Shaohan
    Journal of Computer Science and Technology, 1997, 12 (2) : 154 - 159
  • [50] A Practical Propositional Knowledge Base Revision Algorithm
    陶雪红
    孙伟
    马绍汉
    JournalofComputerScienceandTechnology, 1997, (02) : 154 - 159