Automated Generation of Attack Graphs Using NVD

被引:27
|
作者
Aksu, M. Ugur [1 ,2 ]
Bicakci, Kemal [2 ]
Dilek, M. Hadi [1 ]
Ozbayoglu, A. Murat [2 ]
Tatli, E. Islam [1 ]
机构
[1] STM Def Technol Engn & Trade Inc, Ankara, Turkey
[2] TOBB Univ Econ & Technol, Ankara, Turkey
关键词
attack graph generation; CVE; CVSS; NVD; vulnerability;
D O I
10.1145/3176258.3176339
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the number of vulnerabilities, or examining the vulnerabilities independently produces incomprehensive and limited security assessment results. On the other hand, attack graphs generated from the identified vulnerabilities at a network illustrate security risks via attack paths that are not apparent with the results of the primitive approaches. One common technique of generating attack graphs requires well established definitions and data of prerequisites and postconditions for the known vulnerabilities. A number of works suggest prerequisite and postcondition categorization schemes for software vulnerabilities. However, generating them in an automated way is an open issue. In this paper, we first define a model that evolves over the previous works to depict the requirements of exploiting vulnerabilities for generating attack graphs. Then we describe and compare the results of two different novel approaches (rule-based and machine learning-employed) that we propose for generating attacker privilege fields as prerequisites and postconditions from the National Vulnerability Database (NVD) in an automated way. We observe that prerequisite and postcondition privileges can be generated with overall accuracy rates of 88,8 % and 95,7 % with rule-based and machine learning-employed (Multilayer Perceptron) models respectively.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 50 条
  • [31] Interactive analysis of attack graphs using relational queries
    Wang, Lingyu
    Yao, Chao
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 119 - 132
  • [32] New Goal Recognition Algorithms Using Attack Graphs
    Mirsky, Reuth
    Shalom, Ya'ar
    Majadly, Ahmad
    Gal, Kobi
    Puzis, Rami
    Felner, Ariel
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 260 - 278
  • [33] Measuring Security Risk of Networks Using Attack Graphs
    Noel, Steven
    Jajodia, Sushil
    Wang, Lingyu
    Singhal, Anoop
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2010, 1 (01): : 113 - 123
  • [34] Heuristic Approach for Countermeasure Selection Using Attack Graphs
    Stan, Orly
    Bitton, Ron
    Ezrets, Michal
    Dadon, Moran
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Yagyu, Tomohiko
    Elovici, Yuval
    Shabtai, Asaf
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 634 - 649
  • [35] Triaging Android Systems Using Bayesian Attack Graphs
    Lee, Yu-Tsung
    George, Rahul
    Chen, Haining
    Chan, Kevin
    Jaeger, Trent
    2023 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV, 2023, : 171 - 183
  • [36] Cyber defence using attack graphs prediction and visualisation
    Mishra, Shailendra
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (03) : 268 - 289
  • [37] Toward Measuring Network Security Using Attack Graphs
    Wang, Lingyu
    Singhal, Anoop
    Jajodia, Sushil
    QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 49 - 54
  • [38] Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
    Levner, Eugene
    Tsadikovich, Dmitry
    Algorithms, 2024, 17 (11)
  • [39] GUI-Squatting Attack: Automated Generation of Android Phishing Apps
    Chen, Sen
    Fan, Lingling
    Chen, Chunyang
    Xue, Minhui
    Liu, Yang
    Xu, Lihua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2551 - 2568
  • [40] Mapping Evidence Graphs to Attack Graphs
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2012, : 121 - 126