Exploiting Domination in Attack Graph for Enterprise Network Hardening

被引:2
|
作者
Bopche, Ghanshyam S. [1 ,2 ]
Mehtre, Babu M. [1 ]
机构
[1] IDRBT, CIAM, Hyderabad 500057, Andhra Pradesh, India
[2] Univ Hyderabad, SCIS, Hyderabad 500046, Andhra Pradesh, India
关键词
Attack graph; Network security and protection; Security metric; Graph domination; GENERATION;
D O I
10.1007/978-3-319-22915-7_32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graph proved to be a tool of great value to an administrator while analyzing security vulnerabilities in a networked environment. It shows all possible attack scenarios in an enterprise network. Even though attack graphs are generated efficiently, the size and complexity of the graphs prevent an administrator from fully understanding the information portrayed. While an administrator will quickly perceive the possible attack scenario, it is typically tough to know what vulnerabilities are vital to the success of an adversary. An administrator has to identify such vulnerabilities and associated/enabling preconditions, which really matters in preventing an adversary from successfully compromising the enterprise network. Extraction of such meaningful information aid administrator in efficiently allocating scarce security resources. In this paper, we have applied a well known concept of domination in directed graphs to the exploit-dependency attack graph generated for a synthetic network. The minimal dominating set (MDS) computed over the generated attack graph gives us the set of initial preconditions that covers all the exploits in the attack graph. We model the problem of computing MDS as a set cover problem (SCP). We have presented a small case study to demonstrate the effectiveness and relevancy of the proposed approach. Initial results show that our minimal dominating set-based approach is capable of finding the sets with minimal number of initial conditions that need to be disabled for improved network security.
引用
收藏
页码:342 / 353
页数:12
相关论文
共 50 条
  • [1] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [2] A Heuristic Method of Attack Graph Analysis for Network Security Hardening
    Zhao Chao
    Wang Huiqiang
    Guo Fangfang
    Zhou Mo
    Zhang Yushu
    [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 43 - 47
  • [3] Optimal Network Security Hardening Using Attack Graph Games
    Durkota, Karel
    Lisy, Viliam
    Bosansky, Branislav
    Kiekintveld, Christopher
    [J]. PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 526 - 532
  • [4] Change-Point Detection in Enterprise Attack Surface for Network Hardening
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 475 - 485
  • [5] IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in aWeighted Attack Graph
    Wan, Yinxin
    Lin, Xuanli
    Sabur, Abdulhakim
    Chang, Alena
    Xu, Kuai
    Xue, Guoliang
    [J]. PROCEEDINGS 8TH ACM/IEEE CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION, IOTDI 2023, 2023, : 315 - 326
  • [6] Extending Attack Graph-Based Metrics for Enterprise Network Security Management
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 315 - 325
  • [7] Optimal Security Hardening over a Probabilistic Attack Graph
    Buczkowski, Przemyslaw
    Malacaria, Pasquale
    Hankin, Chris
    Fielder, Andrew
    [J]. SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 21 - 30
  • [8] Detection and Hardening Strategies to Secure an Enterprise Network
    Mukherjee, Preetam
    Thampi, Sabu M.
    Rohith, N.
    Poddar, Bishwajit Kumar
    Sen, Ipshita
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 91 - 108
  • [9] The Construction and Application of Network Attack Graph
    Wang Yonggang
    Miao Yi
    Yang Yang
    Chen Zhong
    Hu Jianbin
    [J]. CHINA COMMUNICATIONS, 2009, 6 (04) : 71 - 74
  • [10] A Review on Network Attack Graph Technology
    Yuan, Bin-tao
    Pan, Zu-lie
    Shi, Fan
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 239 - 245