Real-Time Risk Assessment of Network Security Based on Attack Graphs

被引:0
|
作者
Yin, Xiaochuan [1 ]
Fang, Yan [1 ]
Liu, Yibo [1 ]
机构
[1] Air Force Engn Univ, Informat & Nav Coll, Xian 710077, Peoples R China
关键词
real-time risk; security situation; attack graphs; Bayesian theory; attack evidence;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Facing hackers' intelligent attacks and multi-source information from various security equipments, evaluating real-time risk of the network becomes more and more complicated to handle. This paper proposes a new attack graphs model(NAG)-based analysis method in order to assess the impact on the network system made by multiple vulnerabilities. Aiming at simplify the attack graphs, we combined attack graphs with Bayesian theory and put forward an optimized algorithm to remove the cycles in attack graphs. By importing Common Vulnerability Scoring System (CVSS) and attack evidence, the assessment method in this paper can dynamically evaluate the partial or entire network security. Experimental results show that the method can reflect the changing situation of the network security.
引用
收藏
页码:75 / 80
页数:6
相关论文
共 50 条
  • [1] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [3] On the Use and Reuse of Graphs for Network Security with Real-Time Edge Learning
    Jerge, Michael M.
    Iv, Virgil O. Barnard
    Fullenkamp, Grant
    Klawa, Andy
    [J]. PROCEEDINGS OF 2023 THE 12TH INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATION AND COMPUTING, ICNCC 2023, 2023, : 70 - 79
  • [4] Real-time Risk Assessment Based on Hidden Markov Model and Security Configuration
    Ding Yu-Ting
    Qu Hai-Peng
    Teng Xi-Long
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1599 - +
  • [5] GENERALIZED NETWORK TOPOLOGY PROGRAM FOR REAL-TIME SECURITY ASSESSMENT
    MANSOUR, O
    [J]. IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1978, 97 (04): : 1012 - 1012
  • [6] Security risk assessment based on bayesian multi-step attack graphs
    Yang, Yunxue
    Jin, Shuyuan
    Fang, Binxing
    [J]. Journal of Computational Information Systems, 2015, 11 (11): : 3911 - 3918
  • [7] Fast network attack modeling and security evaluation based on attack graphs
    Kotenko, Igor
    Chechulin, Andrey
    [J]. 1600, River Publishers (03): : 27 - 46
  • [8] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
    GAO Ni
    HE Yiyue
    [J]. Wuhan University Journal of Natural Sciences, 2018, 23 (02) : 171 - 177
  • [9] Real-time Network Model Modification for Online Transient Security Assessment
    Ma, Feng
    Luo, Xiaochuan
    Litvinov, Eugene
    [J]. 2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
  • [10] The Research of Security and Real-Time Based on the Control Information Network
    Su Xiao-hui
    Xu Shu-Ping
    [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768