Abstract
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it suffers from a scalability problem. We propose centrality based network security analysis by ranking important hosts based on network centrality measures, and vulnerabilities based on security metric values. We used two-layer hierarchical attack representation model to evaluate the network security, by taking into account importance of hosts and vulnerabilities in the upper and the lower layers, respectively. We define a new centrality measure based on the location of an attacker and a target. We simulate security analysis using centrality measures comparing with an exhaustive search method. Further, we investigate the performance when the location of the attacker is different in the network.
Original language | English |
---|---|
Title of host publication | 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013 |
Place of Publication | United States |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Number of pages | 8 |
ISBN (Print) | 9781479901814 |
DOIs | |
Publication status | Published - 28 Oct 2013 |
Externally published | Yes |
Event | 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013 - Budapest, Hungary Duration: 24 Jun 2013 → 27 Jun 2013 |
Conference
Conference | 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013 |
---|---|
Country/Territory | Hungary |
City | Budapest |
Period | 24/06/13 → 27/06/13 |