Network Security Risk Assessment Based on Attack Graph

In order to protect the network and evaluate the network security risks automatically, a new multi-agents risk assessment model based on attack graph (MRAMBAG) is presented. First, a network risk assessment model with master-slave agents is established, especially the functional architecture of master-slave agents and the risk association relation analysis process are designed. Then, the attack path and the attack graph are constructed by using the Attract Graph Building algorithm with the input of the dynamic data information collected by components. Finally, risk indexes of attack path, components, hosts, vulnerabilities and association risk index of network nodes are calculated successively and consequently the security risk quantitative index of target networks are obtained. The experimental results demonstrate that the MRAMBAG is a more feasible and effective way for evaluate the network security risk.

[1]  Wanli Zuo,et al.  Optimizing Large Query by Simulated Annealing Algorithm Based On Graph-Based Approach , 2011, J. Softw..

[2]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[3]  C. R. Ramakrishnan,et al.  Model-Based Vulnerability Analysis of Computer Systems , 1998 .

[4]  Paul Ammann,et al.  Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[5]  Jeannette M. Wing,et al.  Scenario graphs and attack graphs , 2004 .

[6]  Zhibin Liu,et al.  Evaluating the Network and Information System Security Based on SVM Model , 2009, J. Comput..

[7]  Cynthia A. Phillips,et al.  A graph-based system for network-vulnerability analysis , 1998, NSPW '98.

[8]  Paul Ammann,et al.  A host-based approach to network attack chaining analysis , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[9]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[10]  Qingtao Wu,et al.  Evaluation of Network Connection Credibility based on Neural Network , 2011, J. Comput..

[11]  Zhang Yong Research on Network Node Correlation in Network Risk Assessment , 2007 .