Efficient Attack Graph Analysis through Approximate Inference

被引:35
作者
Munoz-Gonzalez, Luis [1 ]
Sgandurra, Daniele [2 ]
Paudice, Andrea [1 ]
Lupu, Emil C. [1 ]
机构
[1] Imperial Coll London, Dept Comp, 180 Queens Gate, London SW7 2AZ, England
[2] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Bayesian networks; probabilistic graphical models; approximate inference; BELIEF PROPAGATION;
D O I
10.1145/3105760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs provide compact representations of the attack paths an attacker can follow to compromise network resources from the analysis of network vulnerabilities and topology. These representations are a powerful tool for security risk assessment. Bayesian inference on attack graphs enables the estimation of the risk of compromise to the system's components given their vulnerabilities and interconnections and accounts for multi-step attacks spreading through the system. While static analysis considers the risk posture at rest, dynamic analysis also accounts for evidence of compromise, for example, from Security Information and Event Management software or forensic investigation. However, in this context, exact Bayesian inference techniques do not scale well. In this article, we show how Loopy Belief Propagation-an approximate inference technique-can be applied to attack graphs and that it scales linearly in the number of nodes for both static and dynamic analysis, making such analyses viable for larger networks. We experiment with different topologies and network clustering on synthetic Bayesian attack graphs with thousands of nodes to show that the algorithm's accuracy is acceptable and that it converges to a stable solution. We compare sequential and parallel versions of Loopy Belief Propagation with exact inference techniques for both static and dynamic analysis, showing the advantages and gains of approximate inference techniques when scaling to larger attack graphs.
引用
收藏
页数:30
相关论文
共 63 条
  • [31] Li WH, 2006, SER ADV BIOINFORM, V3, P1
  • [32] Lippmann R, 2006, MILCOM 2006, VOLS 1-7, P3720
  • [33] Network vulnerability assessment using Bayesian networks
    Liu, Y
    Man, H
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 61 - 71
  • [34] Lord N., 2015, The history of data breaches
  • [35] Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices
    Milenkoski, Aleksandar
    Vieira, Marco
    Kounev, Samuel
    Avritzer, Alberto
    Payne, Bryan D.
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [36] Murphy KP, 1999, UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, P467
  • [37] Efficient minimum-cost network hardening via exploit dependency graphs
    Noel, S
    Jajodia, S
    O'Berry, B
    Jacobs, M
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 86 - 95
  • [38] Noel S., 2004, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, New York, NY, USA, P109
  • [39] Experimenting with quantitative evaluation tools for monitoring operational security
    Ortalo, R
    Deswarte, Y
    Kaâniche, M
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (05) : 633 - 650
  • [40] Pearl J., 1988, Morgan Kaufmann series in representation and reasoning, DOI DOI 10.1016/C2009-0-27609-4