Proceedings of 2013 International Conference on Information Science and Computer Applications

Real-Time Risk Assessment of Network Security Based on Attack Graphs

Authors
Xiaochuan Yin, Yan Fang, Yibo Liu
Corresponding Author
Xiaochuan Yin
Available Online October 2013.
DOI
10.2991/isca-13.2013.13How to use a DOI?
Keywords
real-time risk; security situation; attack graphs; Bayesian theory; attack evidence
Abstract

Facing hackers’ intelligent attacks and multi-source information from various security equipments, evaluating real-time risk of the network becomes more and more complicated to handle. This paper proposes a new attack graphs model(NAG)-based analysis method in order to assess the impact on the network system made by multiple vulnerabilities. Aiming at simplify the attack graphs, we combined attack graphs with Bayesian theory and put forward an optimized algorithm to remove the cycles in attack graphs. By importing Common Vulnerability Scoring System (CVSS) and attack evidence, the assessment method in this paper can dynamically evaluate the partial or entire network security. Experimental results show that the method can reflect the changing situation of the network security.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of 2013 International Conference on Information Science and Computer Applications
Series
Advances in Intelligent Systems Research
Publication Date
October 2013
ISBN
10.2991/isca-13.2013.13
ISSN
1951-6851
DOI
10.2991/isca-13.2013.13How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xiaochuan Yin
AU  - Yan Fang
AU  - Yibo Liu
PY  - 2013/10
DA  - 2013/10
TI  - Real-Time Risk Assessment of Network Security Based on Attack Graphs
BT  - Proceedings of 2013 International Conference on Information Science and Computer Applications
PB  - Atlantis Press
SP  - 75
EP  - 80
SN  - 1951-6851
UR  - https://doi.org/10.2991/isca-13.2013.13
DO  - 10.2991/isca-13.2013.13
ID  - Yin2013/10
ER  -