Precise Estimation of Local Probabilities for Bayesian Attack Graph Analysis

Author(s):  
Arnab Paul Joy ◽  
Mosarrat Jahan ◽  
Upama Kabir ◽  
Sanjoy Kumar Mahato
Author(s):  
Kristian Beckers ◽  
Maritta Heisel ◽  
Leanid Krautsevich ◽  
Fabio Martinelli ◽  
Rene Meis ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Jianping Zeng ◽  
Shuang Wu ◽  
Yanyu Chen ◽  
Rui Zeng ◽  
Chengrong Wu

Attack graph can simulate the possible paths used by attackers to invade the network. By using the attack graph, the administrator can evaluate the security of the network and analyze and predict the behavior of the attacker. Although there are many research studies on attack graph, there is no systematic survey for the related analysis methods. This paper firstly introduces the basic concepts, generation methods, and computing tasks of the attack graph, and then, several kinds of analysis methods of attack graph, namely, graph-based method, Bayesian network-based method, Markov model-based method, cost optimization method, and uncertainty analysis method, are described in detail. Finally, comparative study of the methods and future work are provided. We believe that this work would help the research community to understand the attack graph analysis method systematically.


Author(s):  
Marek Malowidzki ◽  
Damian Hermanowski ◽  
Przemyslaw Berezinski

2015 ◽  
Vol 23 (5) ◽  
pp. 516-531 ◽  
Author(s):  
Teodor Sommestad ◽  
Fredrik Sandström

2014 ◽  
Vol 6 (1) ◽  
pp. 28-50 ◽  
Author(s):  
Rahul Chandran ◽  
Wei Q. Yan

The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also contributes the aspect of incorporation of anti-forensic techniques in attack graph which will help in analysis of the diverse possibilities of attack path deviations and thus aids in recommendation of various defense strategies for better security. To the best of our knowledge, this is the first time network anti-forensics has been fully discussed and the attack graphs are employed to analyze the network attacks. The experimental analysis of anti-forensic techniques using attack graphs were conducted in the proposed test-bed which helped to evaluate the model proposed and suggests preventive measures for the improvement of security of the networks.


2017 ◽  
Vol 20 (3) ◽  
pp. 1-30 ◽  
Author(s):  
Luis Muñoz-González ◽  
Daniele Sgandurra ◽  
Andrea Paudice ◽  
Emil C. Lupu

Sign in / Sign up

Export Citation Format

Share Document