A Methodological Framework for AI-Assisted Security Assessments of Active Directory Environments

被引:2
作者
Nebbione, Giuseppe [1 ]
Calzarossa, Maria Carla [1 ]
机构
[1] Univ Pavia, Dept Elect Comp & Biomed Engn, I-27100 Pavia, Italy
关键词
Security; Measurement; Machine learning; Neural networks; Hidden Markov models; Threat assessment; Smart grids; Security assessment; graph theory; machine learning; Active Directory; security threats; vulnerabilities; networked environments; ATTACK GRAPH GENERATION; VULNERABILITY ASSESSMENT;
D O I
10.1109/ACCESS.2023.3244490
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pervasiveness of complex technological infrastructures and services coupled with the continuously evolving threat landscape poses new sophisticated security risks. These risks are mostly associated with many diverse vulnerabilities related to software or hardware security flaws, misconfigurations and operational weaknesses. In this scenario, a timely assessment and mitigation of the security risks affecting technological environments are of paramount importance. To cope with these compelling issues, we propose an AI-assisted methodological framework aimed at evaluating whether the target environment is vulnerable or safe. The framework is based on the combined application of graph-based and machine learning techniques. More precisely, the components of the target together with their vulnerabilities are represented by graphs whose analysis identifies the attack paths associated with potential security threats. Machine learning techniques classify these paths and provide the security assessment of the target. The experimental evaluation of the proposed framework was performed on 220 artificially generated Active Directory environments, half of which injected with vulnerabilities. The results of the classification process were generally good. For example, the F1-score obtained by the Random Forest classifier for the assessment of vulnerable networks was equal to 0.91. These results suggest that our approach could be applied for automating the security assessment procedures of complex networked environments.
引用
收藏
页码:15119 / 15130
页数:12
相关论文
共 57 条
[1]   Machine learning for 5G security: Architecture, recent advances, and challenges [J].
Afaq, Amir ;
Haider, Noman ;
Baig, Muhammad Zeeshan ;
Khan, Komal S. ;
Imran, Muhammad ;
Razzak, Imran .
AD HOC NETWORKS, 2021, 123
[2]  
Aksu MU, 2017, INT CARN CONF SECU
[3]   Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes [J].
Ali, Bako ;
Awad, Ali Ismail .
SENSORS, 2018, 18 (03)
[4]  
Beckers Kristian, 2014, Smart Grid Security. Second International Workshop, SmartGridSec 2014. Revised Selected Papers. LNCS: 8448, P30, DOI 10.1007/978-3-319-10329-7_3
[5]  
Berkouwer S., 2019, ACTIVE DIRECTORY ADM
[6]   Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (04) :176-183
[7]  
Bishop M.A., 2002, The Art and Science of Computer Security
[8]   A Review of Machine Learning Algorithms for Cloud Computing Security [J].
Butt, Umer Ahmed ;
Mehmood, Muhammad ;
Shah, Syed Bilal Hussain ;
Amin, Rashid ;
Shaukat, M. Waqas ;
Raza, Syed Mohsan ;
Suh, Doug Young ;
Piran, Md. Jalil .
ELECTRONICS, 2020, 9 (09) :1-25
[9]  
Byers R., 2022, National vulnerability database, DOI DOI 10.18434/M3436
[10]   A methodology for automated penetration testing of cloud applications [J].
Casola, Valentina ;
De Benedictis, Alessandra ;
Rak, Massimiliano ;
Villano, Umberto .
INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (02) :267-277