Efficient Attack Graph Analysis through Approximate Inference

被引:35
|
作者
Munoz-Gonzalez, Luis [1 ]
Sgandurra, Daniele [2 ]
Paudice, Andrea [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, 180 Queens Gate, London SW7 2AZ, England
[2] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Bayesian networks; probabilistic graphical models; approximate inference; BELIEF PROPAGATION;
D O I
10.1145/3105760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs provide compact representations of the attack paths an attacker can follow to compromise network resources from the analysis of network vulnerabilities and topology. These representations are a powerful tool for security risk assessment. Bayesian inference on attack graphs enables the estimation of the risk of compromise to the system's components given their vulnerabilities and interconnections and accounts for multi-step attacks spreading through the system. While static analysis considers the risk posture at rest, dynamic analysis also accounts for evidence of compromise, for example, from Security Information and Event Management software or forensic investigation. However, in this context, exact Bayesian inference techniques do not scale well. In this article, we show how Loopy Belief Propagation-an approximate inference technique-can be applied to attack graphs and that it scales linearly in the number of nodes for both static and dynamic analysis, making such analyses viable for larger networks. We experiment with different topologies and network clustering on synthetic Bayesian attack graphs with thousands of nodes to show that the algorithm's accuracy is acceptable and that it converges to a stable solution. We compare sequential and parallel versions of Loopy Belief Propagation with exact inference techniques for both static and dynamic analysis, showing the advantages and gains of approximate inference techniques when scaling to larger attack graphs.
引用
收藏
页数:30
相关论文
共 50 条
  • [21] Improving attack graph visualization through data reduction and attack grouping
    Homer, John
    Varikuti, Ashok
    Ou, Xinming
    McQucen, Miles A.
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 68 - +
  • [22] Accelerating TinyML Inference on Microcontrollers through Approximate Kernels
    Armeniakos, Giorgos
    Mentzos, Georgios
    Soudris, Dimitrios
    2024 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS, IPDPSW 2024, 2024, : 177 - 177
  • [23] Efficient approximate approach for graph edit distance problem
    Dabah, Adel
    Chegrane, Ibrahim
    Yahiaoui, Said
    PATTERN RECOGNITION LETTERS, 2021, 151 : 310 - 316
  • [24] Boosting Logical Attack Graph for Efficient Security Control
    Zhang, Zonghua
    Wang, Shuzhen
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 218 - 223
  • [25] GraphPI: Efficient Protein Inference with Graph Neural Networks
    Ma, Zheng
    Chen, Jiazhen
    Xin, Lei
    Ghodsi, Ali
    JOURNAL OF PROTEOME RESEARCH, 2024, 23 (11) : 4821 - 4834
  • [26] Efficient and accurate approximate Bayesian inference with an application to insurance data
    Streftaris, George
    Worton, Bruce J.
    COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2008, 52 (05) : 2604 - 2622
  • [27] A Novel Approach for Analysis of Attack Graph
    Yousefi, Mehdi
    Mtetwa, Nhamo
    Zhang, Yan
    Tianfield, Huaglory
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 7 - 12
  • [28] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567
  • [29] A Reinforcementearning Approach for Attack Graph Analysis
    Yousefi, Mehdi
    Mtetwa, Nhamo
    Zhang, Yan
    Tianfield, Huaglory
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 212 - 217
  • [30] Attack graph analysis: An explanatory guide
    Zenitani, Kengo
    COMPUTERS & SECURITY, 2023, 126