Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

05/13/2020
by   Isaac Matthews, et al.
0

Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs). These BAGs are used to evaluate how security controls affect a network and how changes in topology affect security. A challenge with these automatically generated BAGs is that cycles arise naturally, which make it impossible to use Bayesian network theory to calculate state probabilities. In this paper we provide a systematic approach to analyse and perform computations over cyclic Bayesian attack graphs. handle cycles as well as unifying the theory of Bayesian attack graphs. Our approach first formally introduces two commonly used versions of Bayesian attack graphs and compares their expressiveness. We then present an interpretation of Bayesian attack graphs based on combinational logic circuits, which facilitates an intuitively attractive systematic treatment of cycles. We prove properties of the associated logic circuit and present an algorithm that computes state probabilities without altering the attack graphs (e.g., remove an arc to remove a cycle). Moreover, our algorithm deals seamlessly with all cycles without the need to identify their types. A set of experiments using synthetically created networks demonstrates the scalability of the algorithm on computer networks with hundreds of machines, each with multiple vulnerabilities.

READ FULL TEXT
research
10/08/2015

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

Attack graphs are a powerful tool for security risk assessment by analys...
research
03/18/2021

Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs

A vulnerability scan combined with information about a computer network ...
research
06/22/2016

Efficient Attack Graph Analysis through Approximate Inference

Attack graphs provide compact representations of the attack paths that a...
research
02/08/2022

Ontology-based Attack Graph Enrichment

Attack graphs provide a representation of possible actions that adversar...
research
10/07/2021

Unprovability results for clause set cycles

The notion of clause set cycle abstracts a family of methods for automat...
research
01/23/2020

SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain

State-of-the-art attacks against cyclic logic obfuscation use satisfiabi...
research
01/09/2020

Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs

We consider a system consisting of multiple interdependent assets, and a...

Please sign up or login with your details

Forgot password? Click here to reset