Journal on Communications ›› 2022, Vol. 43 ›› Issue (2): 89-99.doi: 10.11959/j.issn.1000-436x.2022030

• Papers • Previous Articles     Next Articles

Host security assessment method based on attack graph

Hongyu YANG1,2, Haihang YUAN2, Liang ZHANG3   

  1. 1 College of Safety Science and Engineering, Civil Aviation University of China, Tianjin 300300, China
    2 College of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China
    3 College of Information, University of Arizona, Tucson, AZ 85721, USA
  • Revised:2022-01-11 Online:2022-02-25 Published:2022-02-01
  • Supported by:
    The National Natural Science Foundation of China(U1833107)

Abstract:

In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.

Key words: host security, attack graph, atomic attack probability, asset importance, topology importance, security assessment

CLC Number: 

No Suggested Reading articles found!