A hybrid ranking approach to estimate vulnerability for dynamic attacks

被引:12
|
作者
Zhao, Feng [1 ,2 ,3 ]
Huang, Heqing [1 ]
Jin, Hai [1 ,2 ,3 ]
Zhang, Qin [1 ,2 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Serv Comp Technol & Syst Lab, Wuhan 430074, Peoples R China
[3] Cluster & Grid Comp Lab, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Security evaluation; Hybrid ranking; Attack graph; CVSS; Dynamic scenarios; SECURITY;
D O I
10.1016/j.camwa.2011.09.031
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
To enhance security in dynamic networks, it is important to evaluate the vulnerabilities and offer economic and practical patching strategy since vulnerability is the major driving force for attacks. In this paper, a hybrid ranking approach is presented to estimate vulnerabilities under the dynamic scenarios, which is a combination of low-level rating for vulnerability instances and high-level evaluation for the security level of the network system. Moreover, a novel quantitative model, an adapted attack graph, is also proposed to escaping isolated scoring, which takes the dynamic and logic relations among exploits into account, and significantly benefits to vulnerability analysis. To validate applicability and performance of our approach, a hybrid ranking case is implemented as experimental platform. The ranking results show that our approach differentiates the influential levels among vulnerabilities under dynamic attacking scenarios and economically enhances the security of network system. (C) 2011 Elsevier Ltd, All rights reserved.
引用
收藏
页码:4308 / 4321
页数:14
相关论文
共 50 条
  • [1] Ranking Attacks Based on Vulnerability Analysis
    Wang, Ju An
    Wang, Hao
    Guo, Minzhe
    Zhou, Linfeng
    Camargo, Jairo
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 972 - 981
  • [2] Measuring and ranking attacks based on vulnerability analysis
    Wang, Ju An
    Guo, Minzhe
    Wang, Hao
    Zhou, Linfeng
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 455 - 490
  • [3] Measuring and ranking attacks based on vulnerability analysis
    Ju An Wang
    Minzhe Guo
    Hao Wang
    Linfeng Zhou
    Information Systems and e-Business Management, 2012, 10 : 455 - 490
  • [4] A Lyapunov spectrum based hybrid static and dynamic approach for contingency ranking
    Aghtar, Mahdi
    Cheraghzadeh, Mohammadreza
    Doroudi, Aref
    Nasrabadi, Ali Motie
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2023, 17 (16) : 3706 - 3717
  • [5] A Machine Learning Approach for Seismic Vulnerability Ranking
    Karampinis, Ioannis
    Iliadis, Lazaros
    24TH INTERNATIONAL CONFERENCE ON ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EAAAI/EANN 2023, 2023, 1826 : 3 - 16
  • [6] Power Grid Vulnerability Ranking: A Linear Programming Approach
    Nasiruzzaman, A. B. M.
    Shakeruzzaman, A. B. M.
    Akter, Most. Nahida
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL ENGINEERING (ICAEE), 2017, : 579 - 582
  • [7] Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs
    Gamarra, Marco
    Shetty, Sachin
    Gonzalez, Oscar
    Nicol, David M.
    Kamhoua, Charles A.
    Njilla, Laurent
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [8] Data-driven product ranking: A hybrid ranking approach
    Geng, Ruijuan
    Ji, Ying
    Qu, Shaojian
    Wang, Zheng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (04) : 6573 - 6592
  • [9] Hybrid MCDM approach for vendor ranking
    Palanisamy, P.
    Zubar, H. Abdul
    JOURNAL OF MANUFACTURING TECHNOLOGY MANAGEMENT, 2013, 24 (06) : 905 - 928
  • [10] Vulnerability ranking of meters for protection against attacks targeting power system state estimation
    T S Sreeram
    Krishna Suryanarayan
    Sādhanā, 50 (2)