Scalable Attack Graph for Risk Assessment

被引:0
|
作者
Lee, Jehyun [1 ]
Lee, Heejo [1 ]
In, Hoh Peter [1 ]
机构
[1] Korea Univ, Div Comp & Commun Engn, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growth in the size of networks and the number of vulnerabilities is increasingly challenging to manage network security. Especially, difficult to manage are multi-step attacks which are attacks using one or more vulnerabilities as stepping stones. Attack graphs are widely used for analyzing multi-step attacks. However, since these graphs had large sizes, it was too expensive to work with. In this paper, we propose a mechanism to manage attack graphs using a divide and conquer approach. To enhance efficiency of risk analyzer working with attack graphs, we converted a large graph to multiple sub-graphs named risk units and provide the light-weighted graphs to the analyzers. As a result, when k order of time complexity algorithms work with an attack graph with n vertices, a division having c of overhead vertices reduces the workloads from n(k) to r (n + c)(k). And the coefficient r becomes smaller geometrically from 2(-k) depended on their division rounds. By this workload reduction, risk assessment processes which work with large size attack graphs become more scalable and resource practical.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [1] Exploring risk flow attack graph for security risk assessment
    Dai, Fangfang
    Hu, Ying
    Zheng, Kangfeng
    Wu, Bin
    IET INFORMATION SECURITY, 2015, 9 (06) : 344 - 353
  • [2] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [3] Scalable Attack on Graph Data by Important Nodes
    Hu, Wenjiang
    Ma, Mingda
    Jiang, Yanan
    Xia, Hui
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT IV, KSEM 2024, 2024, 14887 : 176 - 188
  • [4] A scalable representation towards attack graph generation
    Bhattacharya, Somak
    Malhotra, Samresh
    Ghsoh, S. K.
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 149 - 152
  • [5] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Mobile Networks and Applications, 2023,
  • [6] A Distributed network risk assessment method based on attack graph
    Yang, Tian Chi
    Fang, Ming
    Shao, Qi Feng
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
  • [7] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1504 - 1513
  • [8] A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
    Luo, Zhiyong
    Xu, Rui
    Wang, Jianming
    Zhu, Weicheng
    International Journal of Network Security, 2022, 24 (05) : 787 - 796
  • [9] Scalable attack on graph data by injecting vicious nodes
    Jihong Wang
    Minnan Luo
    Fnu Suya
    Jundong Li
    Zijiang Yang
    Qinghua Zheng
    Data Mining and Knowledge Discovery, 2020, 34 : 1363 - 1389
  • [10] Scalable attack on graph data by injecting vicious nodes
    Wang, Jihong
    Luo, Minnan
    Suya, Fnu
    Li, Jundong
    Yang, Zijiang
    Zheng, Qinghua
    DATA MINING AND KNOWLEDGE DISCOVERY, 2020, 34 (05) : 1363 - 1389