Proceedings of 2013 International Conference on Information Science and Computer Applications

Real-Time Risk Assessment of Network Security Based on Attack Graphs

Authors
Xiaochuan Yin, Yan Fang, Yibo Liu
Corresponding Author
Xiaochuan Yin
Available Online October 2013.
DOI
https://doi.org/10.2991/isca-13.2013.13How to use a DOI?
Keywords
real-time risk; security situation; attack graphs; Bayesian theory; attack evidence
Abstract
Facing hackers’ intelligent attacks and multi-source information from various security equipments, evaluating real-time risk of the network becomes more and more complicated to handle. This paper proposes a new attack graphs model(NAG)-based analysis method in order to assess the impact on the network system made by multiple vulnerabilities. Aiming at simplify the attack graphs, we combined attack graphs with Bayesian theory and put forward an optimized algorithm to remove the cycles in attack graphs. By importing Common Vulnerability Scoring System (CVSS) and attack evidence, the assessment method in this paper can dynamically evaluate the partial or entire network security. Experimental results show that the method can reflect the changing situation of the network security.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
2013 International Conference on Information Science and Computer Applications (ISCA 2013)
Part of series
Advances in Intelligent Systems Research
Publication Date
October 2013
ISBN
978-90786-77-85-7
ISSN
1951-6851
DOI
https://doi.org/10.2991/isca-13.2013.13How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Xiaochuan Yin
AU  - Yan Fang
AU  - Yibo Liu
PY  - 2013/10
DA  - 2013/10
TI  - Real-Time Risk Assessment of Network Security Based on Attack Graphs
BT  - 2013 International Conference on Information Science and Computer Applications (ISCA 2013)
PB  - Atlantis Press
SN  - 1951-6851
UR  - https://doi.org/10.2991/isca-13.2013.13
DO  - https://doi.org/10.2991/isca-13.2013.13
ID  - Yin2013/10
ER  -