A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory

被引:0
作者
Duan, Chenjian [1 ]
Wang, Zhen [1 ]
Ding, Hong [1 ]
Jiang, Mengting [1 ]
Ren, Yizhi [1 ]
Wu, Ting [1 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Peoples R China
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II | 2020年 / 11945卷
基金
中国国家自然科学基金;
关键词
Vulnerability ranking; Shapley value; Vulnerability Dependency Graph;
D O I
10.1007/978-3-030-38961-1_34
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is very important for administrators to understand the severity of vulnerabilities in network systems. Although many systems such as CVSS can evaluate individual vulnerabilities, they do not take into account the specific environment, so the results are not helpful. In our paper, we construct a vulnerability dependency graph by modeling the complex dependencies between vulnerabilities, and introduce the Shapley value in the cooperative game. We consider an attack path as a cooperation between the vulnerability nodes, and use Access Complexity as the attack cost of each node, define the characteristic function in the cooperative. Finally, according to the Shapley value of each node, all the vulnerabilities are ranked, and the administrator can patch the high-rank vulnerabilities with the limited security resources. Our experimental results demonstrate that show that our method can more effectively assess the severity of vulnerabilities in specific environments.
引用
收藏
页码:391 / 398
页数:8
相关论文
共 17 条
  • [1] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [2] Polynomial calculation of the Shapley value based on sampling
    Castro, Javier
    Gomez, Daniel
    Tejada, Juan
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2009, 36 (05) : 1726 - 1730
  • [3] ON THE COMPLEXITY OF COOPERATIVE SOLUTION CONCEPTS
    DENG, XT
    PAPADIMITRIOU, CH
    [J]. MATHEMATICS OF OPERATIONS RESEARCH, 1994, 19 (02) : 257 - 266
  • [4] Homer J., 2009, 115 KANS STAT U
  • [5] [贾炜 Jia Wei], 2012, [中国科学院研究生院学报, Journal of the Graduate School of the Academy of Sciences], V29, P529
  • [6] Jian J, 2012, PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON EMERGENCY MANAGEMENT 2011, P61, DOI 10.1109/SERE.2012.16
  • [7] Li P., 2012, Power System Technology (POWERCON), 2012 IEEE International Conference on, P1
  • [8] An approach to model network exploitations using exploitation graphs
    Li, We
    Vaughn, Rayford B.
    Dandass, Yoginder S.
    [J]. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2006, 82 (08): : 523 - 541
  • [9] Mell, 2007, PUBLISHED 1 FORUM IN, V1, P23
  • [10] Michalak T.P., 23 INT JOINT C ART I, P293