The optimized attribute attack graph based on APT attack stage model

Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.

[1]  Colin Tankard,et al.  Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..

[2]  Jianhua Li,et al.  Building network attack graph for alert causal correlation , 2008, Comput. Secur..

[3]  Christoph Meinel,et al.  A New Alert Correlation Algorithm Based on Attack Graph , 2011, CISIS.

[4]  Joint Task Force Transformation Initiative,et al.  Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .

[5]  Won Hyung Park,et al.  A study on cyber threat prediction based on intrusion detection event for APT attack detection , 2012, Multimedia Tools and Applications.

[6]  Anthony Lai,et al.  Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.

[7]  Jianfang Li,et al.  The study of APT attack stage model , 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS).

[8]  Meng Yuan A Backward Search Approach to Attack Graph Generation Based on Attack Patterns , 2011 .

[9]  Yi Zhang,et al.  Two Formal Analysis of Attack Graphs: Two Formal Analysis of Attack Graphs , 2010 .

[10]  Anoop Singhal,et al.  Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .

[11]  Yi Zhang,et al.  A Scalable Approach to Analyzing Network Security using Compact Attack Graphs , 2010, J. Networks.

[12]  Liu Lon Complete Attack Graph Automatic Generation Method Based on Attack Pattern , 2013 .

[13]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.