Visible to the public A Novel Approach for Analysis of Attack Graph

TitleA Novel Approach for Analysis of Attack Graph
Publication TypeConference Paper
Year of Publication2017
AuthorsYousefi, M., Mtetwa, N., Zhang, Y., Tianfield, H.
Conference Name2017 IEEE International Conference on Intelligence and Security Informatics (ISI)
Keywordsattack graph, Attack Graphs, Complexity theory, composability, computer network security, cyber security, graph theory, interconnections, IT infrastructure system, IT network scenario, Markov model, Markov processes, Metrics, multihost multistage vulnerability analysis, network configurations, network interconnectivities, Network security, network theory (graphs), Network topology, network vulnerabilities, Ports (Computers), Protocols, pubcrawl, resilience, Resiliency, security, security administrators, security attack graphs, security metrics, Servers, transition graph, vulnerability assessment
Abstract

Attack graph technique is a common tool for the evaluation of network security. However, attack graphs are generally too large and complex to be understood and interpreted by security administrators. This paper proposes an analysis framework for security attack graphs for a given IT infrastructure system. First, in order to facilitate the discovery of interconnectivities among vulnerabilities in a network, multi-host multi-stage vulnerability analysis (MulVAL) is employed to generate an attack graph for a given network topology. Then a novel algorithm is applied to refine the attack graph and generate a simplified graph called a transition graph. Next, a Markov model is used to project the future security posture of the system. Finally, the framework is evaluated by applying it on a typical IT network scenario with specific services, network configurations, and vulnerabilities.

URLhttps://ieeexplore.ieee.org/document/8004866/
DOI10.1109/ISI.2017.8004866
Citation Keyyousefi_novel_2017