Network Security Node-Edge Scoring System Using Attack Graph Based on Vulnerability Correlation

被引:6
|
作者
Shin, Gun-Yoon [1 ]
Hong, Sung-Sam [2 ]
Lee, Jung-Sik [3 ]
Han, In-Sung [3 ]
Kim, Hwa-Kyung [4 ]
Oh, Haeng-Rok [3 ]
机构
[1] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
[2] Rabahgroow Co Ltd, 10,Seongnam Daero 926Beon Gil, Seongnam Si 13506, South Korea
[3] Agcy Def Dev, Cyber Network Technol Ctr, POB 132, Seoul 05661, South Korea
[4] Jiin Syst, 167 Songpa Daero, Seoul 05855, South Korea
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 14期
关键词
network security; common vulnerability scoring system; scoring system; vulnerability correlation analysis; attack graph;
D O I
10.3390/app12146852
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
As network technology has advanced, and as larger and larger quantities of data are being collected, networks are becoming increasingly complex. Various vulnerabilities are being identified in such networks, and related attacks are continuously occurring. To solve these problems and improve the overall quality of network security, a network risk scoring technique using attack graphs and vulnerability information must be used. This technology calculates the degree of risk by collecting information and related vulnerabilities in the nodes and the edges existing in the network-based attack graph, and then determining the degree of risk in a specific network location or the degree of risk occurring when a specific route is passed within the network. However, in most previous research, the risk of the entire route has been calculated and evaluated based on node information, rather than edge information. Since these methods do not include correlations between nodes, it is relatively difficult to evaluate the risk. Therefore, in this paper, we propose a vulnerability Correlation and Attack Graph-based node-edge Scoring System (VCAG-SS) that can accurately measure the risk of a specific route. The proposed method uses the Common Vulnerability Scoring System (CVSS) along with node and edge information. Performing the previously proposed arithmetic evaluation of confidentiality, integrity, and availability (CIA) and analyzing the correlation of vulnerabilities between each node make it possible to calculate the attack priority. In the experiment, the risk scores of nodes and edges and the risk of each attack route were calculated. Moreover, the most threatening attack route was found by comparing the attack route risk. This confirmed that the proposed method calculated the risk of the network attack route and was able to effectively select the network route by providing the network route priority according to the risk score.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement
    Wang, Pengyang
    Gui, Jiaping
    Chen, Zhengzhang
    Rhee, Junghwan
    Chen, Haifeng
    Fu, Yanjie
    [J]. WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020), 2020, : 2144 - 2154
  • [2] Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System
    Doynikova, Elena
    Chechulin, Andrey
    Kotenko, Igor
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 53 - 61
  • [3] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [4] Novel Method of Assessing Network Security Risks Based on Vulnerability Correlation Graph
    Liang, Li
    Yang, Jungang
    Liu, Guqing
    Zhu, Guangliang
    Yang, Yanfeng
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1085 - 1090
  • [5] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [6] Adversarial Learning Based Node-Edge Graph Attention Networks for Autism Spectrum Disorder Identification
    Chen, Yuzhong
    Yan, Jiadong
    Jiang, Mingxin
    Zhang, Tuo
    Zhao, Zhongbo
    Zhao, Weihua
    Zheng, Jian
    Yao, Dezhong
    Zhang, Rong
    Kendrick, Keith M.
    Jiang, Xi
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (06) : 7275 - 7286
  • [7] A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph
    Zhou, Ying
    Zhang, Zhiyong
    Zhao, Kejing
    Zhang, Zhongya
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [8] Evaluation of Network Risk Using Attack Graph Based Security Metrics
    Kumar, Santosh
    Negi, Anuradha
    Prasad, Keshav
    Mahanti, Aniket
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
  • [9] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [10] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347