K maximum probability attack paths dynamic generation algorithm

نویسندگان

  • Kun Bi
  • Dezhi Han
  • Jun Wang
چکیده

An attack graph depicts multiple-step attack and provides a description of system security vulnerabilities. It illustrates critical information necessary to identify potential weaknesses and areas for enhanced defense. Attack graphs include multiple attack paths, which are a focus for further detailed analysis and risk mitigation. Considering that different vulnerabilities have different probabilities of being exploited, this paper proposes an algorithm to dynamically generate the top K attack paths with maximum probabilities for every node of a system. The proposed algorithm does not require generation of the full attack graph to calculate the K attack paths. Instead, it directly processes and analyzes the system input data and dynamically identifies the K attack paths. The computational time, based upon the complexity of the attack paths, can be constrained by the parameter K. Experimental results show that the algorithm is scalable and efficient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achieving Path Diversity over the Internet using MDS Codes

Path diversity works by setting up multiple parallel connections between the end points using the topological path redundancy of the network. In this paper, Forward Error Correction (FEC) is applied across multiple independent paths to enhance the endto-end reliability. Internet paths are modeled as erasure Gilbert-Elliot channels [1], [2]. First, it is shown that over any erasure channel, Maxi...

متن کامل

Path Diversity over the Internet: Performance Analysis and Rate Allocation

Path diversity works by setting up multiple parallel connections between the end points using the topological path redundancy of the network. In this paper, Forward Error Correction (FEC) is applied across multiple independent paths to enhance the endto-end reliability. Internet paths are modeled as erasure Gilbert-Elliot channels [1], [2]. First, it is shown that over any erasure channel, Maxi...

متن کامل

A Navigation System for Autonomous Robot Operating in Unknown and Dynamic Environment: Escaping Algorithm

In this study, the problem of navigation in dynamic and unknown environment is investigated and a navigation method based on force field approach is suggested. It is assumed that the robot performs navigation in...

متن کامل

یکپارچه‌سازی بهینه انرژی باد در برنامه‌ریزی توسعه تولید انرژی الکتریکی با در نظر گرفتن نوسانات و عدم قطعیت

Wind Power generation integrated in electrical power system can cause of variation and uncertainty which must be considered in process of generation expansion planning (GEP). The goal of this study is to model the GEP problem integrated with wind power generation and introduce the fuzzy-probability model to consider variation and uncertainty of wind power generation. To verify and optimize the ...

متن کامل

Research on Object-oriented Software Testing Cases of Automatic Generation

In the research on automatic generation of testing cases, there are different execution paths under drivers of different testing cases. The probability of these paths being executed is also different. For paths which are easy to be executed, more redundant testing case tend to be generated; But only fewer testing cases are generated for the control paths which are hard to be executed. Genetic a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comput. Sci. Inf. Syst.

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2016