Abstract
The paper discusses the problem of computer networks’ security evaluation. It focuses on attack graph based approach. The proposed method is based on MulVAL reasoning engine that identifies possible attack paths leading from an attacker to pointed assets of the assessed IT network. These paths create an attack graph used for attack probability calculation. The method takes advantage of information from vulnerability scanners and topology snapshot. A typical enterprise network has been examined and attack graph based security evaluation- presented. The case study probability calculations have been provided including possible remediation. Benefits and limitations of proposed method have been discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S.: An attack graph-based probabilistic security metric. In: Data and Applications Security XXII. DBSec. LNCS, vol. 5094. LNCS, pp. 283–296. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70567-3_22
Homer, J., Zhang, S., Ou, X., Schmidt, D., Du, Y.: Aggregating vulnerability metrics in enterprise networks using attack graphs. J. Comput. Secur. 21(4), 561–597 (2013). https://doi.org/10.3233/JCS-130475
Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: Proceedings of 14th Conference USENIX Security Symposium,vol. 14, p. 8 (2005)
Hermanowski, D., Piotrowski, R.: Proactive risk assessment based on attack graphs. An element of the risk management process on system, enterprise and national level. In: IEEE International Conference on Data Science and Systems DSS-2018, Exeter, Great Britain, https://doi.org/10.1109/HPCC/SmartCity/DSS.2018.00237
Frank, M.S., Konrad, W.: Comparative Study and Roadmap DRA, Comparative study and roadmap for the development of the dynamic risk assessment function. Technical report 2012/SPW007956/03
ISO 31000 - Risk management. https://www.iso.org/iso-31000-risk-management.html. Accessed 15 Dec 2020
North Atlantic Treaty Organization: Management Directive on CIS Security (2005). https://www.nbu.cz/download/pravni-predpisy---nato/AC_35-D_2005-REV3.pdf. Accessed 15 Dec 2020
Common Vulnerability Enumeration. https://cve.mitre.org Accessed 15 Dec 2020
Common Vulnerability Scoring System v3.0: Specification Document (2015). https://www.first.org/cvss/v3.0/specification-document. Accessed 15 Dec 2020
Common Weakness Enumeration - About CWE (2020). https://cwe.mitre.org/. Accessed 15 Dec 2020
Common Vulnerability Scoring System v3.0: User Guide. https://www.first.org/cvss/v3.0/cvss-v30-user_guide_v1.6.pdf. Accessed 15 Dec 2020.
Huang, S., Green, T., Loo, B.: Datalog and Emerging applications: An Interactive Tutorial. http://www.cs.ucdavis.edu/~green/papers/sigmod906t-huang.pdf. Accessed 15 Dec 2020. https://doi.org/10.1145/1989323.1989456
Strom, B.E., et al.: MITRE ATT&CK™: Design and Philosophy (2018). https://www.mitre.org/sites/default/files/publications/pr-18-0944-11-mitre-attack-design-and-philosophy.pdf. Accessed 15 Dec 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hermanowski, D., Piotrowski, R. (2021). Network Risk Assessment Based on Attack Graphs. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Engineering of Dependable Computer Systems and Networks. DepCoS-RELCOMEX 2021. Advances in Intelligent Systems and Computing, vol 1389. Springer, Cham. https://doi.org/10.1007/978-3-030-76773-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-76773-0_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-76772-3
Online ISBN: 978-3-030-76773-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)