A scalable attack graph generation for network security management

A valid path detection algorithm was also formulated to determine the most critical and valid paths needed within an Attack Graph for the purpose network security risk assessment. The results showed that the proposed model alleviates redundancy in Attack Graphs. This will assist the security administrator in making reasonable decision on the security risk management of the network systems. | Journal of Computer Science and Information Technology December 2018, Vol. 6, No. 2, pp. 30-44 ISSN 2334-2366(Print) 2334-2374(Online) Copyright © The Author(s). All Rights Reserved. Published by American Research Institute for Policy Development DOI: URL: A Scalable Attack Graph Generation for Network Security Management Akinyemi , Jekoyemi , Aladesanmi , Aderounmu Kamagaté Abstract As the dependencies on network system is increasing, such systems are vulnerable and are exposed to different attacks due to some software misconfigurations, software flaws and operating system service malfunctions. Network managers often rely on Attack Graphs to visually perform security risk assessment on the network systems. The Attack Graphs are very cumbersome to visually understand as they grow exponentially when the size of the network increases or the number of hosts‟ vulnerabilities increases in a network. This paper addresses the scalability issues of Attack Graph generation by leveraging on graph theory background. MulVAL and Nessus scanners tools were employed for the generation of Attack Graphs and network information mapping respectively. A computational algorithm that is capable of handling cycles was formulated. A valid path detection algorithm was also formulated to determine the most critical and valid paths needed within an Attack Graph for the purpose network security risk assessment. The results showed that the proposed model alleviates redundancy in Attack Graphs. This will assist the security administrator in making reasonable decision on the security risk management of the network systems. Keywords: Graph, Cycles, Critical Path, Attack, Risk Management, Security 1. Introduction Computer Networks play important roles in today‟s economy and national infrastructures. The dependencies on them are increasing in various fields of economic, financial, business etc. Network systems are .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.