Real-Time Risk Assessment of Network Security Based on Attack Graphs
Xiaochuan Yin, Yan Fang, Yibo Liu
Available Online October 2013.
- https://doi.org/10.2991/isca-13.2013.13How to use a DOI?
- real-time risk; security situation; attack graphs; Bayesian theory; attack evidence
- Facing hackers’ intelligent attacks and multi-source information from various security equipments, evaluating real-time risk of the network becomes more and more complicated to handle. This paper proposes a new attack graphs model(NAG)-based analysis method in order to assess the impact on the network system made by multiple vulnerabilities. Aiming at simplify the attack graphs, we combined attack graphs with Bayesian theory and put forward an optimized algorithm to remove the cycles in attack graphs. By importing Common Vulnerability Scoring System (CVSS) and attack evidence, the assessment method in this paper can dynamically evaluate the partial or entire network security. Experimental results show that the method can reflect the changing situation of the network security.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Xiaochuan Yin AU - Yan Fang AU - Yibo Liu PY - 2013/10 DA - 2013/10 TI - Real-Time Risk Assessment of Network Security Based on Attack Graphs BT - 2013 International Conference on Information Science and Computer Applications (ISCA 2013) PB - Atlantis Press SP - 75 EP - 80 SN - 1951-6851 UR - https://doi.org/10.2991/isca-13.2013.13 DO - https://doi.org/10.2991/isca-13.2013.13 ID - Yin2013/10 ER -