Exploiting Domination in Attack Graph for Enterprise Network Hardening

被引:2
|
作者
Bopche, Ghanshyam S. [1 ,2 ]
Mehtre, Babu M. [1 ]
机构
[1] IDRBT, CIAM, Hyderabad 500057, Andhra Pradesh, India
[2] Univ Hyderabad, SCIS, Hyderabad 500046, Andhra Pradesh, India
关键词
Attack graph; Network security and protection; Security metric; Graph domination; GENERATION;
D O I
10.1007/978-3-319-22915-7_32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graph proved to be a tool of great value to an administrator while analyzing security vulnerabilities in a networked environment. It shows all possible attack scenarios in an enterprise network. Even though attack graphs are generated efficiently, the size and complexity of the graphs prevent an administrator from fully understanding the information portrayed. While an administrator will quickly perceive the possible attack scenario, it is typically tough to know what vulnerabilities are vital to the success of an adversary. An administrator has to identify such vulnerabilities and associated/enabling preconditions, which really matters in preventing an adversary from successfully compromising the enterprise network. Extraction of such meaningful information aid administrator in efficiently allocating scarce security resources. In this paper, we have applied a well known concept of domination in directed graphs to the exploit-dependency attack graph generated for a synthetic network. The minimal dominating set (MDS) computed over the generated attack graph gives us the set of initial preconditions that covers all the exploits in the attack graph. We model the problem of computing MDS as a set cover problem (SCP). We have presented a small case study to demonstrate the effectiveness and relevancy of the proposed approach. Initial results show that our minimal dominating set-based approach is capable of finding the sets with minimal number of initial conditions that need to be disabled for improved network security.
引用
收藏
页码:342 / 353
页数:12
相关论文
共 50 条
  • [21] Exploring attack graph for cost-benefit security hardening: A probabilistic approach
    Wang, Shuzhen
    Zhang, Zonghua
    Kadobayashi, Youki
    [J]. COMPUTERS & SECURITY, 2013, 32 : 158 - 169
  • [22] Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph
    Dai, Fangfang
    Zheng, Kangfeng
    Binwu
    Luo, Shoushan
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1920 - 1937
  • [23] Minimum-cost network hardening using attack graphs
    Wang, Lingyu
    Noel, Steven
    Jajodia, Sushil
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (18) : 3812 - 3824
  • [24] A Minimum Cost of Network Hardening Model Based on Attack Graphs
    Ma Jun-chun
    Wang Yong-jun
    Sun Ji-yin
    Chen Shan
    [J]. CEIS 2011, 2011, 15
  • [25] A Graph Model of the Topology of Physical, Link and Network Layers of an Enterprise Network
    Andreev, Anton
    Kolosov, Aleksandr
    Voronin, Anatoly
    Bogoiavlenskii, Iurii
    [J]. PROCEEDINGS OF THE 19TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2016, : 3 - 9
  • [26] Domination parameters of the splitting graph of a graph
    Deepalakshmi, J.
    Marimuthu, G.
    Somasundaram, A.
    Arumugam, S.
    [J]. COMMUNICATIONS IN COMBINATORICS AND OPTIMIZATION, 2022, : 631 - 637
  • [27] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [28] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [29] Automatic Construction and Optimization of Layered Network Attack Graph
    Wang, Yonggang
    Gui, Nike
    Hu, Jianbin
    Chen, Zhong
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 135 - 138
  • [30] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660