Network vulnerability assessment using Bayesian networks

被引:87
作者
Liu, Y [1 ]
Man, H [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
来源
DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005 | 2005年 / 5812卷
关键词
network vulnerability; attack graph; Bayesian network;
D O I
10.1117/12.604240
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
While computer vulnerabilities have been continually reported in laundry-list format by most commercial scanners, a comprehensive network vulnerability assessment has been an increasing challenge to security analysts. Researchers have proposed a variety of methods to build attack trees with chains of exploits, based on which post-graph vulnerability analysis can be performed. The most recent approaches attempt to build attack trees by enumerating all potential attack paths, which are space consuming and result in poor scalability. This paper presents an approach to use Bayesian network to model potential attack paths. We call such graph as "Bayesian attack graph". It provides a more compact representation of attack paths than conventional methods. Bayesian inference methods can be conveniently used for probabilistic analysis. In particular, we use the Bucket Elimination algorithm for belief updating, and we use Maximum Probability Explanation algorithm to compute an optimal subset of attack paths relative to prior knowledge on attackers and attack mechanisms. We tested our model on an experimental network. Test results demonstrate the effectiveness of our approach.
引用
收藏
页码:61 / 71
页数:11
相关论文
共 13 条
  • [1] Ammann P., 2002, 9 ACM C COMPUTER COM, DOI DOI 10.1145/586110.586140
  • [2] [Anonymous], 2003, Practical UNIX and internet Security
  • [3] Dacier M., 1996, 96493 LAAS
  • [4] DECHTER R, 1999, GRAPH MODELS, P75
  • [5] Frey B. J., 1998, ADAP COMP MACH LEARN
  • [6] Two formal analyses of attack graphs
    Jha, S
    Sheyner, O
    Wing, J
    [J]. 15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 49 - 63
  • [7] JORDAN MJ, 1999, GRAPHICAL MODELS
  • [8] Experimenting with quantitative evaluation tools for monitoring operational security
    Ortalo, R
    Deswarte, Y
    Kaâniche, M
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (05) : 633 - 650
  • [9] PEARLMAN J, 1988, PROBABILISTIC REASON
  • [10] Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71