Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

10/08/2015
by   Luis Muñoz-González, et al.
1

Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources. The uncertainty about the attacker's behaviour makes Bayesian networks suitable to model attack graphs to perform static and dynamic analysis. Previous approaches have focused on the formalization of attack graphs into a Bayesian model rather than proposing mechanisms for their analysis. In this paper we propose to use efficient algorithms to make exact inference in Bayesian attack graphs, enabling the static and dynamic network risk assessments. To support the validity of our approach we have performed an extensive experimental evaluation on synthetic Bayesian attack graphs with different topologies, showing the computational advantages in terms of time and memory use of the proposed techniques when compared to existing approaches.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/22/2016

Efficient Attack Graph Analysis through Approximate Inference

Attack graphs provide compact representations of the attack paths that a...
research
05/13/2020

Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

Attack graphs are commonly used to analyse the security of medium-sized ...
research
06/01/2021

A Bayesian-network-based cybersecurity adversarial risk analysis framework with numerical examples

Cybersecurity risk analysis plays an essential role in supporting organi...
research
08/11/2022

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

Organizations employ various adversary models in order to assess the ris...
research
04/07/2012

Characterization of Dynamic Bayesian Network

In this report, we will be interested at Dynamic Bayesian Network (DBNs)...
research
03/18/2021

Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs

A vulnerability scan combined with information about a computer network ...
research
04/02/2018

Using Unit Testing to Detect Sanitization Flaws

Input sanitization mechanisms are widely used to mitigate vulnerabilitie...

Please sign up or login with your details

Forgot password? Click here to reset