Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

Published: 01 March 2019 Publication History

Abstract

Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources. The uncertainty about the attacker's behaviour makes Bayesian networks suitable to model attack graphs to perform static and dynamic analysis. Previous approaches have focused on the formalization of attack graphs into a Bayesian model rather than proposing mechanisms for their analysis. In this paper we propose to use efficient algorithms to make exact inference in Bayesian attack graphs, enabling the static and dynamic network risk assessments. To support the validity of our approach we have performed an extensive experimental evaluation on synthetic Bayesian attack graphs with different topologies, showing the computational advantages in terms of time and memory use of the proposed techniques when compared to existing approaches.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 16, Issue 2
March 2019
185 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 March 2019

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential ManifoldsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321480920:5(4070-4084)Online publication date: 31-Aug-2023
  • (2023)Including insider threats into risk management through Bayesian threat graph networksComputers and Security10.1016/j.cose.2023.103410133:COnline publication date: 1-Oct-2023
  • (2023)Cyber-physical attack graphs (CPAGs)Computers and Security10.1016/j.cose.2023.103348132:COnline publication date: 1-Sep-2023
  • (2023)Attack graph analysisComputers and Security10.1016/j.cose.2022.103081126:COnline publication date: 1-Mar-2023
  • (2023)Dynamic logic-based attack graph for risk assessment in complex computer systemsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.109730228:COnline publication date: 1-Jun-2023
  • (2022)Consider the ConsequencesSecurity and Communication Networks10.1155/2022/34556472022Online publication date: 1-Jan-2022
  • (2021)Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSATACM Transactions on Cyber-Physical Systems10.1145/34511695:3(1-29)Online publication date: 11-Jul-2021
  • (2021)Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack GraphsScience of Cyber Security10.1007/978-3-030-89137-4_12(171-186)Online publication date: 13-Aug-2021
  • (2020)Hazard Driven Threat Modelling for Cyber Physical SystemsProceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy10.1145/3411498.3419967(13-24)Online publication date: 9-Nov-2020
  • (2020)Bayesian attack graphs for platform virtualized infrastructures in cloudsJournal of Information Security and Applications10.1016/j.jisa.2020.10245551:COnline publication date: 1-Apr-2020
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media