Scalable Attack Graph for Risk Assessment

被引:0
|
作者
Lee, Jehyun [1 ]
Lee, Heejo [1 ]
In, Hoh Peter [1 ]
机构
[1] Korea Univ, Div Comp & Commun Engn, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growth in the size of networks and the number of vulnerabilities is increasingly challenging to manage network security. Especially, difficult to manage are multi-step attacks which are attacks using one or more vulnerabilities as stepping stones. Attack graphs are widely used for analyzing multi-step attacks. However, since these graphs had large sizes, it was too expensive to work with. In this paper, we propose a mechanism to manage attack graphs using a divide and conquer approach. To enhance efficiency of risk analyzer working with attack graphs, we converted a large graph to multiple sub-graphs named risk units and provide the light-weighted graphs to the analyzers. As a result, when k order of time complexity algorithms work with an attack graph with n vertices, a division having c of overhead vertices reduces the workloads from n(k) to r (n + c)(k). And the coefficient r becomes smaller geometrically from 2(-k) depended on their division rounds. By this workload reduction, risk assessment processes which work with large size attack graphs become more scalable and resource practical.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [21] It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation
    Palma, Alessandro
    Angelini, Marco
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 229 - 250
  • [22] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
  • [23] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [24] Attack Graph based Network Risk Assessment: Exact Inference vs Region-based Approximation
    Cheng, Qi
    Kwiat, Kevin
    Kamhoua, Charles A.
    Njilla, Laurent
    2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, : 84 - 87
  • [25] Individual risk assessment for worm attack
    Schnieder, Thomas
    KLEINTIERPRAXIS, 2008, 53 (12): : 797 - 799
  • [26] Cloud Attack and Risk Assessment Taxonomy
    Juliadotter, Nina Viktoria
    Choo, Kim-Kwang Raymond
    IEEE CLOUD COMPUTING, 2015, 2 (01): : 14 - 20
  • [27] An Approach for Security Assessment of Network Configurations using Attack Graph
    Ghosh, Nirnay
    Ghosh, S. K.
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 283 - 288
  • [28] Risk assessment method of power plant industrial control information security based on Bayesian attack graph Systems
    Xie, Jianbo
    Sun, Keda
    Lei, Xubing
    JOURNAL OF ELECTRICAL SYSTEMS, 2021, 17 (04) : 529 - 541
  • [29] An Attack Graph Based Risk Management Approach of an Enterprise LAN
    Bhattacharya, Somak
    Ghosh, S. K.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (02): : 119 - 127
  • [30] An approach of security risk evaluation based on the Bayesian attack graph
    Hui, Wang
    Fuwang, Chen
    Yunfeng, Wang
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 953 - 960