Scalable Attack Graph for Risk Assessment

被引:0
|
作者
Lee, Jehyun [1 ]
Lee, Heejo [1 ]
In, Hoh Peter [1 ]
机构
[1] Korea Univ, Div Comp & Commun Engn, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growth in the size of networks and the number of vulnerabilities is increasingly challenging to manage network security. Especially, difficult to manage are multi-step attacks which are attacks using one or more vulnerabilities as stepping stones. Attack graphs are widely used for analyzing multi-step attacks. However, since these graphs had large sizes, it was too expensive to work with. In this paper, we propose a mechanism to manage attack graphs using a divide and conquer approach. To enhance efficiency of risk analyzer working with attack graphs, we converted a large graph to multiple sub-graphs named risk units and provide the light-weighted graphs to the analyzers. As a result, when k order of time complexity algorithms work with an attack graph with n vertices, a division having c of overhead vertices reduces the workloads from n(k) to r (n + c)(k). And the coefficient r becomes smaller geometrically from 2(-k) depended on their division rounds. By this workload reduction, risk assessment processes which work with large size attack graphs become more scalable and resource practical.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [31] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [32] Pedestrian and Bicyclist Scalable Risk Assessment Methods
    Turner, Shawn
    Hampshire, Robert
    Redmon, Tamara
    Fitzpatrick, Kay
    ITE JOURNAL-INSTITUTE OF TRANSPORTATION ENGINEERS, 2019, 89 (04): : 45 - 49
  • [33] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [34] Cyber Security Risk Assessment of a DDoS Attack
    Wangen, Gaute
    Shalaginov, Andrii
    Hallstensen, Christoffer
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 183 - 202
  • [35] Assessment of asthma attack risk using an online risk checker
    Broadbent, Catherine
    Kennington, Erika
    Walker, Samantha
    EUROPEAN RESPIRATORY JOURNAL, 2017, 50
  • [36] RFID System Security Assessment Methodology Based on Attack Graph Model
    Yang, Xiaoming
    Wang, Jiahao
    Huang, Yifu
    Qin, Zhiguang
    PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1161 - 1166
  • [37] Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
    Luckett, Patrick
    McDonald, J. Todd
    Glisson, William Bradley
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 3648 - 3657
  • [38] Scalable Analysis of Attack Scenarios
    Albanese, Massimiliano
    Jajodia, Sushi
    Pugliese, Andrea
    Subrahmanian, V. S.
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 416 - +
  • [39] On scalable attack detection in the network
    Kompella, Ramana Rao
    Singh, Sumeet
    Varghese, George
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (01) : 14 - 25
  • [40] An artificial intelligence based approach for risk management using attack graph
    Bhattacharya, Somak
    Ghosh, S. K.
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 794 - 798