Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs

03/18/2021
by   Isaac Matthews, et al.
0

A vulnerability scan combined with information about a computer network can be used to create an attack graph, a model of how the elements of a network could be used in an attack to reach specific states or goals in the network. These graphs can be understood probabilistically by turning them into Bayesian attack graphs, making it possible to quantitatively analyse the security of large networks. In the event of an attack, probabilities on the graph change depending on the evidence discovered (e.g., by an intrusion detection system or knowledge of a host's activity). Since such scenarios are difficult to solve through direct computation, we discuss and compare three stochastic simulation techniques for updating the probabilities dynamically based on the evidence and compare their speed and accuracy. From our experiments we conclude that likelihood weighting is most efficient for most uses. We also consider sensitivity analysis of BAGs, to identify the most critical nodes for protection of the network and solve the uncertainty problem in the assignment of priors to nodes. Since sensitivity analysis can easily become computationally expensive, we present and demonstrate an efficient sensitivity analysis approach that exploits a quantitative relation with stochastic inference.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/09/2023

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

Provenance graphs are structured audit logs that describe the history of...
research
06/22/2016

Efficient Attack Graph Analysis through Approximate Inference

Attack graphs provide compact representations of the attack paths that a...
research
05/13/2020

Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

Attack graphs are commonly used to analyse the security of medium-sized ...
research
10/08/2015

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

Attack graphs are a powerful tool for security risk assessment by analys...
research
04/23/2010

Real-Time Alert Correlation with Type Graphs

The premise of automated alert correlation is to accept that false alert...
research
03/27/2013

Weighing and Integrating Evidence for Stochastic Simulation in Bayesian Networks

Stochastic simulation approaches perform probabilistic inference in Baye...
research
07/11/2012

Evidence-invariant Sensitivity Bounds

The sensitivities revealed by a sensitivity analysis of a probabilistic ...

Please sign up or login with your details

Forgot password? Click here to reset