A planner-based approach to generate and analyze minimal attack graph

被引:40
作者
Ghosh, Nirnay [1 ]
Ghosh, S. K. [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
关键词
Network security; Attack graph; Attack path; Exploit; Planner; NETWORK; MODEL;
D O I
10.1007/s10489-010-0266-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the present scenario, even well administered networks are susceptible to sophisticated cyber attacks. Such attack combines vulnerabilities existing on different systems/services and are potentially more harmful than single point attacks. One of the methods for analyzing such security vulnerabilities in an enterprise network is the use of attack graph. It is a complete graph which gives a succinct representation of different attack scenarios, depicted by attack paths. An attack path is a logical succession of exploits, where each exploit in the series satisfies the preconditions for subsequent exploits and makes a causal relationship among them. Thus analysis of the attack graph may help in assessing network security from hackers' perspective. One of the intrinsic problems with the generation and analysis of such a complete attack graph is its scalability. In this work, an approach based on Planner, a special purpose search algorithm from artificial intelligence domain, has been proposed for time-efficient, scalable representation of the attack graphs. Further, customized algorithms have been developed for automatic generation of attack paths (using Planner as a low-level module). The analysis shows that generation of attack graph using the customized algorithms can be done in polynomial time. A case study has also been presented to demonstrate the efficacy of the proposed methodology.
引用
收藏
页码:369 / 390
页数:22
相关论文
共 30 条
  • [1] Ammann P, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P64
  • [2] [Anonymous], 2005, ESCTR2005054 MIT LIN
  • [3] [Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
  • [4] [Anonymous], P 2 IEEE SYST MAN CY
  • [5] [Anonymous], 2006, Proceedings of the 2nd ACM workshop on Quality of protection
  • [6] Bhattacharya S, 2008, THESIS IIT KHARAGPUR
  • [7] Fast planning through planning graph analysis
    Blum, AL
    Furst, ML
    [J]. ARTIFICIAL INTELLIGENCE, 1997, 90 (1-2) : 281 - 300
  • [8] Planning and control in artificial intelligence: A unifying perspective
    Bonet, B
    Geffner, H
    [J]. APPLIED INTELLIGENCE, 2001, 14 (03) : 237 - 252
  • [9] Temporal planning using subgoal partitioning and resolution in SGPlan
    Chen, Yixin
    Wah, Benjamin W.
    Hsu, Chih-Wei
    [J]. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2006, 26 (323-369) : 323 - 369
  • [10] Cuppens F, 2000, LECT NOTES COMPUT SC, V1907, P197