Evaluating Network Security Based on Attack Graph

Article Preview

Abstract:

By now, Attack Graph (AG) is widely applied to the field of network security assessment. In the AG, each vertex has a value that implies the probability of the exploit and each edge represents the relationship between the exploits. In this paper we design an AG model and propose an approach which integrates the AG model with the Dynamic Bayesian Network (DBN). The approach not only strengthens the rationality of uncertain reasoning, but also provides a quantitative assessment of network security status. We evaluated the approach by experiment. The results showed that our model is rather accurate and the performance of it is competitive.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

2374-2378

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Wang,A. Singhal, and S. Jajodia. Measuring network security using attack graphs. In Proceedings of the 3rd ACM workshop on Quality of protection(Qop'07), New York, NY, USA, 2007. ACM Press.

DOI: 10.1145/1314257.1314273

Google Scholar

[2] L. Wang,C. Yao,A. Singhal, and S. Jajodia. Interactive analysis of attack graphs using relational queries. In Proceedings of 20th IFIP WG 11. 3 Working Conference on Data and Applications Security(DBSEC'06), pages 119-132, (2006).

DOI: 10.1007/11805588_9

Google Scholar

[3] Y. Liu,H. Man. Network vulnerability assessment using Bayesian networks. In Proceeding of Data Mining, Intrusion Detection, Information Assurance and Data Networks Security, pages 61-71, (2005).

DOI: 10.1117/12.604240

Google Scholar

[4] S. Jajodia,S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar,J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, (2003).

DOI: 10.1007/0-387-24230-9_9

Google Scholar

[5] Common vulnerability scoring system version2. Available at: http: /www. first. org/cvss/. (2011).

Google Scholar

[6] National vulnerability database. Available at: http/www. vud. org.

Google Scholar

[7] Pengsu Cheng. Security metric through combining CVSS base scores: [D]. Univ. of Concordia, (2011).

Google Scholar

[8] M. Frigault and L. Wang. Measuring network security using Bayesian network-based attack graphs. In Proceedings of the 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA'08), (2008).

DOI: 10.1109/compsac.2008.88

Google Scholar

[9] M. Frigault,L. Wang, A. Singhal, and S. Jajodia. Measuring network security using dynamic Bayesian network. In Proceedings of ACM workshop on Quality of protection, (2008).

DOI: 10.1145/1456362.1456368

Google Scholar

[10] Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, pages 217-224, (2002).

DOI: 10.1145/586110.586140

Google Scholar

[11] Boston university representative internet topology generator. Available at http: /www. cs. bu. edu/brite.

Google Scholar