Efficient Attack Graph Analysis through Approximate Inference

被引:35
|
作者
Munoz-Gonzalez, Luis [1 ]
Sgandurra, Daniele [2 ]
Paudice, Andrea [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, 180 Queens Gate, London SW7 2AZ, England
[2] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Bayesian networks; probabilistic graphical models; approximate inference; BELIEF PROPAGATION;
D O I
10.1145/3105760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs provide compact representations of the attack paths an attacker can follow to compromise network resources from the analysis of network vulnerabilities and topology. These representations are a powerful tool for security risk assessment. Bayesian inference on attack graphs enables the estimation of the risk of compromise to the system's components given their vulnerabilities and interconnections and accounts for multi-step attacks spreading through the system. While static analysis considers the risk posture at rest, dynamic analysis also accounts for evidence of compromise, for example, from Security Information and Event Management software or forensic investigation. However, in this context, exact Bayesian inference techniques do not scale well. In this article, we show how Loopy Belief Propagation-an approximate inference technique-can be applied to attack graphs and that it scales linearly in the number of nodes for both static and dynamic analysis, making such analyses viable for larger networks. We experiment with different topologies and network clustering on synthetic Bayesian attack graphs with thousands of nodes to show that the algorithm's accuracy is acceptable and that it converges to a stable solution. We compare sequential and parallel versions of Loopy Belief Propagation with exact inference techniques for both static and dynamic analysis, showing the advantages and gains of approximate inference techniques when scaling to larger attack graphs.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] Defense against membership inference attack in graph neural networks through graph perturbation
    Kai Wang
    Jinxia Wu
    Tianqing Zhu
    Wei Ren
    Ying Hong
    International Journal of Information Security, 2023, 22 : 497 - 509
  • [2] Defense against membership inference attack in graph neural networks through graph perturbation
    Wang, Kai
    Wu, Jinxia
    Zhu, Tianqing
    Ren, Wei
    Hong, Ying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 497 - 509
  • [3] Membership Inference Attack on Graph Neural Networks
    Olatunji, Iyiola E.
    Nejdl, Wolfgang
    Khosla, Megha
    2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 11 - 20
  • [4] FastInf: An efficient approximate inference library
    Jaimovich, Ariel
    Meshi, Ofer
    McGraw, Ian
    Elidan, Gal
    Journal of Machine Learning Research, 2010, 11 : 1733 - 1736
  • [5] FastInf: An Efficient Approximate Inference Library
    Jaimovich, Ariel
    Meshi, Ofer
    McGraw, Ian
    Elidan, Gal
    JOURNAL OF MACHINE LEARNING RESEARCH, 2010, 11 : 1733 - 1736
  • [6] Approximate Solutions for Attack Graph Games with Imperfect Information
    Durkota, Karel
    Lisy, Viliam
    Bosansky, Branislav
    Kiekintveld, Christopher
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 228 - 249
  • [7] Meaningful Attack Graph Reconstruction Through Stochastic Marking Analysis
    Fazio, Peppino
    Tropea, Mauro
    Marano, Salvatore
    Voznak, Miroslav
    PROCEEDINGS OF THE 2016 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2016,
  • [8] Cyber resilience measurement through logical attack graph analysis
    Tchimwa Bouom, Aymar Le Pere
    Lienou, Jean-Pierre
    Nelson, Frederica Free
    Shetty, Sachin
    Ejuh Geh, Wilson
    Kamhoua, Charles A.
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 6034 - 6039
  • [9] Deployment Optimization of IoT Devices through Attack Graph Analysis
    Agmon, Noga
    Shabtai, Asaf
    Puzis, Rami
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 192 - 202
  • [10] Leveraging Graph Neighborhoods for Efficient Inference
    Chekol, Melisachew Wudage
    Stuckenschmidt, Heiner
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 1893 - 1902