A Novel Attack Graph Posterior Inference Model Based on Bayesian Network

HTML  Download Download as PDF (Size: 2036KB)  PP. 8-27  
DOI: 10.4236/jis.2011.21002    6,584 Downloads   12,259 Views  Citations

Affiliation(s)

.

ABSTRACT

Network attack graphs are originally used to evaluate what the worst security state is when a concerned net-work is under attack. Combined with intrusion evidence such like IDS alerts, attack graphs can be further used to perform security state posterior inference (i.e. inference based on observation experience). In this area, Bayesian network is an ideal mathematic tool, however it can not be directly applied for the following three reasons: 1) in a network attack graph, there may exist directed cycles which are never permitted in a Bayesian network, 2) there may exist temporal partial ordering relations among intrusion evidence that can-not be easily modeled in a Bayesian network, and 3) just one Bayesian network cannot be used to infer both the current and the future security state of a network. In this work, we improve an approximate Bayesian posterior inference algorithm–the likelihood-weighting algorithm to resolve the above obstacles. We give out all the pseudocodes of the algorithm and use several examples to demonstrate its benefit. Based on this, we further propose a network security assessment and enhancement method along with a small network scenario to exemplify its usage.

Share and Cite:

Zhang, S. and Song, S. (2011) A Novel Attack Graph Posterior Inference Model Based on Bayesian Network. Journal of Information Security, 2, 8-27. doi: 10.4236/jis.2011.21002.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.