Research on network risk assessment based on attack graph of expected benefits-rate

As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network no...

Full description

Bibliographic Details
Main Authors: Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-08-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022047
_version_ 1811271899880095744
author Wenfu LIU
Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE
author_facet Wenfu LIU
Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE
author_sort Wenfu LIU
collection DOAJ
description As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.
first_indexed 2024-04-12T22:29:23Z
format Article
id doaj.art-5168daec08454e268fd51c6796c100b6
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-12T22:29:23Z
publishDate 2022-08-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-5168daec08454e268fd51c6796c100b62022-12-22T03:14:01ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-08-0184879710.11959/j.issn.2096-109x.2022047Research on network risk assessment based on attack graph of expected benefits-rateWenfu LIU0 Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE1Information Engineering University, Zhengzhou 450001, China ; State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, Luoyang 471003, ChinaInformation Engineering University, Zhengzhou 450001, ChinaAs Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022047attack graphrisk assessmentattack pathexpected benefits-rateattack graph of benefits-rate
spellingShingle Wenfu LIU
Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE
Research on network risk assessment based on attack graph of expected benefits-rate
网络与信息安全学报
attack graph
risk assessment
attack path
expected benefits-rate
attack graph of benefits-rate
title Research on network risk assessment based on attack graph of expected benefits-rate
title_full Research on network risk assessment based on attack graph of expected benefits-rate
title_fullStr Research on network risk assessment based on attack graph of expected benefits-rate
title_full_unstemmed Research on network risk assessment based on attack graph of expected benefits-rate
title_short Research on network risk assessment based on attack graph of expected benefits-rate
title_sort research on network risk assessment based on attack graph of expected benefits rate
topic attack graph
risk assessment
attack path
expected benefits-rate
attack graph of benefits-rate
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022047
work_keys_str_mv AT wenfuliu researchonnetworkriskassessmentbasedonattackgraphofexpectedbenefitsrate
AT jianminpangxinzhounanlifengyue researchonnetworkriskassessmentbasedonattackgraphofexpectedbenefitsrate