Attack Graph-based Risk Assessment and Optimisation Approach
نویسندگان
چکیده
Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA). Each attack path is considered as an independent attack scenario from the source of attack to the target. Many such paths form the individuals in the evolutionary GA solution. The population-based strategy of a GA provides a natural way of exploring a large number of possible attack paths to find the paths that are most important. Thus unlike many other optimisation solutions a range of solutions can be presented to a user of the methodology.
منابع مشابه
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملAssessment of dose reduction and influence of gantry rotation time in CT abdomen examinations
Background: Worldwide the computed tomography (CT) scanning is recognized as a high radiation dose modality. This article aimed to estimate the radiation dose reduction and radiogenic risks for adult patients undertaking abdominal CT examinations. Materials and Methods: A total of 128 patients were studied using 2, 4, 16 and 64 slice CT scanners. The patients were divided into two categories: t...
متن کاملNetwork Security Risk Assessment Based on Attack Graph
In order to protect the network and evaluate the network security risks automatically, a new multi-agents risk assessment model based on attack graph (MRAMBAG) is presented. First, a network risk assessment model with master-slave agents is established, especially the functional architecture of master-slave agents and the risk association relation analysis process are designed. Then, the attack...
متن کاملA reliability-based maintenance technicians’ workloads optimisation model with stochastic consideration
The growing interest in technicians’ workloads research is probably associated with the recent surge in competition. This was prompted by unprecedented technological development that triggers changes in customer tastes and preferences for industrial goods. In a quest for business improvement, this worldwide intense competition in industries has stimulated theories and practical frameworks that ...
متن کامل