ChinaCom2009-Network and Information Security Symposium

Research Article

Using attack graphs and intrusion evidences to extrapolate network security state

  • @INPROCEEDINGS{10.1109/CHINACOM.2009.5339841,
        author={Shaojun Zhang and Lan Li and Jianhua Li and Shanshan Song and Xiuzhen Chen},
        title={Using attack graphs and intrusion evidences to extrapolate network security state},
        proceedings={ChinaCom2009-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2009-NIS},
        year={2009},
        month={11},
        keywords={Network security; attack graph; intrusion evidence; Bayesian inference},
        doi={10.1109/CHINACOM.2009.5339841}
    }
    
  • Shaojun Zhang
    Lan Li
    Jianhua Li
    Shanshan Song
    Xiuzhen Chen
    Year: 2009
    Using attack graphs and intrusion evidences to extrapolate network security state
    CHINACOM2009-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2009.5339841
Shaojun Zhang1,*, Lan Li1,*, Jianhua Li1,*, Shanshan Song1,*, Xiuzhen Chen1,*
  • 1: School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China Shanghai Key Laboratory for Information Security Integrated Management Technology Research, Shanghai, China
*Contact email: zshaojun@sjtu.edu.cn, lanli@sjtu.edu.cn, lijh888@sjtu.edu.cn, songss1985@sjtu.edu.cn, chenxz@sjtu.edu.cn

Abstract

Network attack graphs are originally used to evaluate what the worst security state will be if a network is under attack. Along with observed intrusion evidences, we can further use attack graphs to extrapolate the current security state of a concerned network. Methods have been proposed in recent years to use observed intrusion evidences to compute the node belief metric of network attack graphs. However, these methods suffer either from low model generality, high computational complexity or immoderate dependence on empirical formulas. To overcome these obstacles, we improve one of the Bayesian network inference algorithms - the likelihood weighting algorithm into a novel node belief metric computation method. Experiment results show our method can achieve high computational accuracy in linear computational complexity, a feature making it feasible to be used to process large scale network attack graphs in real-time.