Paper
8 December 2022 An intelligent method for building attack paths based on Bayesian attack graphs
Yanfang Fu, Cheng Wang, Fang Wang, LiPeng S., ZhiQiang Du, ZiJian Cao
Author Affiliations +
Proceedings Volume 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022); 1247412 (2022) https://doi.org/10.1117/12.2653480
Event: Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 2022, Guilin, China
Abstract
To address the scenario that there is the subjectivity of prior probability in the attack graph after the introduction of Bayesian network in the network attack model and the failure of attack nodes is not considered, an optimization scheme of the Bayesian attack graph and an intelligent construction method of attack path based on this scheme are proposed. The risk value of the target network is calculated to avoid the subjectivity of the prior probability and the devices are abstracted as attack graph nodes, and the atomic attacks are used as causal inference relations to reconstruct the attack graph. The analysis results show that the method has a significant improvement in the speed of attack graph and attack path generation and attack success rate, and it can perform the intelligent construction of attack path when the attack nodes fail.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yanfang Fu, Cheng Wang, Fang Wang, LiPeng S., ZhiQiang Du, and ZiJian Cao "An intelligent method for building attack paths based on Bayesian attack graphs", Proc. SPIE 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 1247412 (8 December 2022); https://doi.org/10.1117/12.2653480
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Networks

Defense and security

Internet

Computer engineering

Computer security

Information security

RELATED CONTENT


Back to Top