Cutting Medusa's Path – Tackling Kill-Chains with Quantum Computing

11/24/2022
by   Mark Carney, et al.
0

This paper embarks upon exploration of quantum vulnerability analysis. By introducing vulnerability graphs, related to attack graphs, this paper provides background theory and a subsequent method for solving significant cybersecurity problems with quantum computing. The example given is to prioritize patches by expressing the connectivity of various vulnerabilities on a network with a QUBO and then solving this with quantum annealing. Such a solution is then proved to remove all kill-chains (paths to security compromise) on a network. The results demonstrate that the quantum computer's solve time is almost constant compared to the exponential increase in classical solve time for vulnerability graphs of expected real world density. As such, this paper presents a novel example of advantageous quantum vulnerability analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/18/2019

The impact of quantum computing on real-world security: A 5G case study

This paper provides a detailed analysis of the impact of quantum computi...
research
06/11/2021

Challenge: Quantum Computing for Location Determination

Quantum computing provides a new way for approaching problem solving, en...
research
01/25/2019

Quantum Terrorism: Collective Vulnerability of Global Quantum Systems

The major imminent investments in quantum technologies will bring concep...
research
10/01/2018

Community Detection Across Emerging Quantum Architectures

One of the roadmap plans for quantum computers is an integration within ...
research
08/21/2023

Closeness and Residual Closeness of Harary Graphs

Analysis of a network in terms of vulnerability is one of the most signi...
research
07/16/2020

Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation

By leveraging the principle of software polyculture to ensure security i...
research
06/07/2023

Development of a System Vulnerability Analysis Tool for Assessment of Complex Mission Critical Systems

A system vulnerability analysis technique (SVAT) for complex mission cri...

Please sign up or login with your details

Forgot password? Click here to reset