Scalable Attack Graph for Risk Assessment

被引:0
|
作者
Lee, Jehyun [1 ]
Lee, Heejo [1 ]
In, Hoh Peter [1 ]
机构
[1] Korea Univ, Div Comp & Commun Engn, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growth in the size of networks and the number of vulnerabilities is increasingly challenging to manage network security. Especially, difficult to manage are multi-step attacks which are attacks using one or more vulnerabilities as stepping stones. Attack graphs are widely used for analyzing multi-step attacks. However, since these graphs had large sizes, it was too expensive to work with. In this paper, we propose a mechanism to manage attack graphs using a divide and conquer approach. To enhance efficiency of risk analyzer working with attack graphs, we converted a large graph to multiple sub-graphs named risk units and provide the light-weighted graphs to the analyzers. As a result, when k order of time complexity algorithms work with an attack graph with n vertices, a division having c of overhead vertices reduces the workloads from n(k) to r (n + c)(k). And the coefficient r becomes smaller geometrically from 2(-k) depended on their division rounds. By this workload reduction, risk assessment processes which work with large size attack graphs become more scalable and resource practical.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [41] Evaluation of Network Risk Using Attack Graph Based Security Metrics
    Kumar, Santosh
    Negi, Anuradha
    Prasad, Keshav
    Mahanti, Aniket
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
  • [42] Attack Graph Obfuscation
    Polad, Hadar
    Puzis, Rami
    Shapira, Bracha
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 269 - 287
  • [43] Scalable Graph Sampling on GPUs with Compressed Graph
    Yin, Hongbo
    Shao, Yingxia
    Miao, Xupeng
    Li, Yawen
    Cui, Bin
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 2383 - 2392
  • [44] Graph partitioning for scalable distributed graph computations
    Buluc, Aydin
    Madduri, Kamesh
    GRAPH PARTITIONING AND GRAPH CLUSTERING, 2013, 588 : 83 - +
  • [45] A Compact Vulnerability Knowledge Graph for Risk Assessment
    Yin, Jiao
    Hong, Wei
    Wang, Hua
    Cao, Jinli
    Miao, Yuan
    Zhang, Yanchun
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2024, 18 (08)
  • [46] Damage risk assessment of breakwaters under tsunami attack
    Ergin, Aysen
    Balas, Can Elmar
    NATURAL HAZARDS, 2006, 39 (02) : 231 - 243
  • [47] Damage risk assessment of breakwaters under tsunami attack
    Ayşen Ergin
    Can Elmar Balas
    Natural Hazards, 2006, 39 : 231 - 243
  • [48] Risk Assessment of Distribution Network Considering Network Attack
    Chen, Biyun
    Dai, Qiaoling
    Cui, Zhiwei
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [49] Unifying traditional risk assessment approaches with attack trees
    Paul, Stephane
    Vignon-Davillier, Raphael
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (03) : 165 - 181
  • [50] Quantitative assessment for the vulnerability of cyber-physical system based on attack graph
    Huang, Jiahui
    Feng, Dongqin
    International Journal of Electrical Engineering, 2015, 22 (06): : 201 - 207