首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops >Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures
【24h】

Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures

机译:使用中心度测量的分层攻击表示模型中的可扩展安全分析

获取原文

摘要

Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it suffers from a scalability problem. We propose centrality based network security analysis by ranking important hosts based on network centrality measures, and vulnerabilities based on security metric values. We used two-layer hierarchical attack representation model to evaluate the network security, by taking into account importance of hosts and vulnerabilities in the upper and the lower layers, respectively. We define a new centrality measure based on the location of an attacker and a target. We simulate security analysis using centrality measures comparing with an exhaustive search method. Further, we investigate the performance when the location of the attacker is different in the network.
机译:可以使用攻击表示模型(武器)(例如,攻击图(AGS)和攻击树(ATS))来分析网络安全性。可以通过计算所有可能的攻击方案来分析网络安全性,但它遭受可扩展性问题。我们通过基于网络中心度量的重要主机(基于安全度量值)为基于重要的主机提出基于网络安全分析。我们使用了两层分层攻击表示模型来评估网络安全,分别考虑了上层和下层中的主机和漏洞的重要性。我们根据攻击者和目标的位置定义新的中心度量。我们使用与详尽的搜索方法进行比较来模拟安全分析。此外,当攻击者的位置在网络中不同时,我们调查该性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号