Scalable security analysis in hierarchical attack representation model using centrality measures

Jin B. Hong, Dong Seong Kim

Research output: Chapter in Book/Conference paperConference paperpeer-review

21 Citations (Scopus)

Abstract

Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it suffers from a scalability problem. We propose centrality based network security analysis by ranking important hosts based on network centrality measures, and vulnerabilities based on security metric values. We used two-layer hierarchical attack representation model to evaluate the network security, by taking into account importance of hosts and vulnerabilities in the upper and the lower layers, respectively. We define a new centrality measure based on the location of an attacker and a target. We simulate security analysis using centrality measures comparing with an exhaustive search method. Further, we investigate the performance when the location of the attacker is different in the network.

Original languageEnglish
Title of host publication2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages8
ISBN (Print)9781479901814
DOIs
Publication statusPublished - 28 Oct 2013
Externally publishedYes
Event2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013 - Budapest, Hungary
Duration: 24 Jun 201327 Jun 2013

Conference

Conference2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN-W 2013
Country/TerritoryHungary
CityBudapest
Period24/06/1327/06/13

Fingerprint

Dive into the research topics of 'Scalable security analysis in hierarchical attack representation model using centrality measures'. Together they form a unique fingerprint.

Cite this