Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model

Author:

Li Yunpeng1ORCID,Li Xi1ORCID

Affiliation:

1. Qingdao Vocational and Technical College of Hotel Management, Qingdao, Shan Dong 266100, China

Abstract

With the rapid development of the Internet, network attacks often occur, and network security is widely concerned. Searching for practical security risk assessment methods is a research hotspot in the field of network security. Network attack graph model is an active detection technology for the attack path. From the perspective of the attacker, it simulated the whole network attack scenario and then presented the dependency among the vulnerabilities in the target network in the way of directed graph. It is an effective tool for analyzing network vulnerability. This paper describes in detail the common methods and tools of network security assessment and analyzes the construction of theoretical model of attack graph, the optimization technology of attack graph, and the research status of qualitative and quantitative analysis technology of attack graph in network security assessment. The attack graph generated in the face of large-scale network is too complex to find the key vulnerability nodes accurately and quickly. Optimizing the attack graph and solving the key attack set can help the security manager better understand the security state of the nodes in the network system, so as to strengthen the security defense ability and guarantee the security of the network system. For all kinds of loop phenomena of directed attribute attack graph, the general method of eliminating loop is given to get an acyclic attack graph. On the basis of acyclic attack graph, an optimization algorithm based on path complexity is proposed, which takes atomic attack distance and atomic weight into consideration, and on the basis of simplified attack graph, minimum-cost security reinforcement is carried out for the network environment. Based on the ant colony algorithm, the adaptive updating principle of changing pheromone and the local searching strategy of the adaptive genetic algorithm are proposed to improve the ant colony algorithm. The experimental results show that compared with the ant colony algorithm, the improved ant colony algorithm can speed up the process of solving the optimal solution. When the number of attack paths is large, the advantages of the improved ant colony algorithm in solving accuracy and late search speed are more obvious, and it is more suitable for large-scale networks.

Publisher

Hindawi Limited

Subject

Computer Science Applications,Software

Reference20 articles.

1. Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs;M. H. R. Khoisan;European Journal of Operational Research,2019

2. SOCMTD: selecting optimal countermeasure for moving target defense using dynamic game;H. Hu;KSII Transactions on Internet and Information Systems (TIIS),2020

3. The Internet of Things

4. Multi-target cinnamic acids for oxidative stress and inflammation: design, synthesis, biological evaluation and modeling studies;E. D. Pontiki;Molecules,2019

5. Smart, Secure, Yet Energy-Efficient, Internet-of-Things Sensors

Cited by 13 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Key Vulnerable Nodes Discovery Based on Bayesian Attack Subgraphs and Improved Fuzzy C-Means Clustering;Mathematics;2024-05-08

2. Computer Network Data Security Encryption Technology;2024 International Conference on Electrical Drives, Power Electronics & Engineering (EDPEE);2024-02-27

3. Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network;Computers, Materials & Continua;2024

4. Research on Clustering Detection Method for Security Attack Behaviors Based on Air Traffic Control Network;2023 IEEE International Conference on E-health Networking, Application & Services (Healthcom);2023-12-15

5. Active Defense Detection Technology for Power System Network Attacks Based on Artificial Intelligence;2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC);2023-12-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3