An artificial intelligence based approach for risk management using attack graph

被引:5
作者
Bhattacharya, Somak [1 ]
Ghosh, S. K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
来源
CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS | 2007年
关键词
D O I
10.1109/CIS.2007.145
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set Of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.
引用
收藏
页码:794 / 798
页数:5
相关论文
共 11 条
[1]  
AMMANN P, 2005, COMP SEC APPL C 21 A, P10
[2]  
Ammann P., 2002, P 9 ACM C COMP COMM
[3]   Practical attack graph generation for network defense [J].
Ingols, Kyle ;
Lippmann, Richard ;
Piwowarski, Keith .
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, :121-+
[4]  
Jajodia S., 2003, MANAGING CYBER THREA, pCH5
[5]  
NOEL S, 2003, 19 ANN COMP SEC APPL
[6]  
NOEL S, 2004, VIZSEC DMSEC 04 P 20, P109
[7]  
NOEL S, 2005, COMP SEC APPL C 21 A, P72
[8]  
Norvig P, 1995, ARTIFICIAL INTELLIGE
[9]  
Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71
[10]   Using model checking to analyze network vulnerabilities [J].
Ritchey, RW ;
Ammann, P .
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, :156-165