Title :
Scalable security analysis in hierarchical attack representation model using centrality measures
Author :
Hong, Jin B. ; Dong Seong Kim
Author_Institution :
Comput. Sci. & Software Eng. Dept., Univ. of Canterbury, Christchurch, New Zealand
Abstract :
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it suffers from a scalability problem. We propose centrality based network security analysis by ranking important hosts based on network centrality measures, and vulnerabilities based on security metric values. We used two-layer hierarchical attack representation model to evaluate the network security, by taking into account importance of hosts and vulnerabilities in the upper and the lower layers, respectively. We define a new centrality measure based on the location of an attacker and a target. We simulate security analysis using centrality measures comparing with an exhaustive search method. Further, we investigate the performance when the location of the attacker is different in the network.
Keywords :
computer network security; search problems; ARM; attack graphs; attack representation models; attack trees; centrality measures; hierarchical attack representation model; network security; scalable security analysis; search method; security metric values; Computational modeling; Security; Attack Graph; Attack Tree; Network Centrality; Security Analysis; Security Modelling Techniques;
Conference_Titel :
Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on
Conference_Location :
Budapest
DOI :
10.1109/DSNW.2013.6615507