Analysis of Complex Networks for Security Issues using Attack Graph

Tanvirali Musa, Kheng Cher Yeo, Sami Azam, Bharanidharan Shanmugam, Asif Karim, Friso De Boer, Fernaz Narin Nur, Fahad Faisal

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Abstract

Organizations perform security analysis for assessing network health and safe-guarding their growing networks through Vulnerability Assessments (AKA VA Scans). The output of VA scans is reports on individual hosts and its vulnerabilities, which, are of little use as the origin of the attack can't be located from these. Attack Graphs, generated without an in-depth analysis of the VA reports, are used to fill in these gaps, but only provide cursory information. This study presents an effective model of depicting the devices and the data flow that efficiently identifies the weakest nodes along with the concerned vulnerability's origin.The complexity of the attach graph using MulVal has been greatly reduced using the proposed approach of using the risk and CVSS base score as evaluation criteria. This makes it easier for the user to interpret the attack graphs and thus reduce the time taken needed to identify the attack paths and where the attack originates from.

Original languageEnglish
Title of host publication2019 International Conference on Computer Communication and Informatics, ICCCI 2019
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages6
ISBN (Electronic)9781538682593
DOIs
Publication statusPublished - 2019
Event9th International Conference on Computer Communication and Informatics, ICCCI 2019 - Coimbatore, Tamil Nadu, India
Duration: 23 Jan 201925 Jan 2019

Publication series

Name2019 International Conference on Computer Communication and Informatics, ICCCI 2019

Conference

Conference9th International Conference on Computer Communication and Informatics, ICCCI 2019
CountryIndia
CityCoimbatore, Tamil Nadu
Period23/01/1925/01/19

Fingerprint Dive into the research topics of 'Analysis of Complex Networks for Security Issues using Attack Graph'. Together they form a unique fingerprint.

Cite this