Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Journal of Beijing University of Posts and Telecommunications ›› 2022, Vol. 45 ›› Issue (2): 16-21.doi: 10.13190/j.jbupt.2021-166

• PAPERS • Previous Articles     Next Articles

A Risk Assessment Method of Network Host Node with Host Importance

YANG Hongyu1,2, YUAN Haihang2, ZHANG Liang3   

  1. 1. College of Safety Science and Engineering, Civil Aviation University of China, Tianjin 300300, China;
    2. College of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China;
    3. College of Information, University of Arizona, Tucson AZ85721, USA
  • Received:2021-08-06 Published:2021-12-16

Abstract: The existing network host node assessment methods based on attack graph have unreasonable calculation of atomic attack probability and asset protection value, and ignore the impact of the association relationship between host nodes on host node risk value. To solve these problems, a risk assessment scheme based on the importance of hosts in the network is proposed. Firstly, a host-based attack graph based on network information is build, and then the probability of atomic attack is calculated by vulnerability exploitability, code availability and defense intensity. After that, the attack probability of path is calculated based on the attack graph. Furthermore, the host importance is characterized from the attack graph structure and asset protection value. The reciprocal of atomic attack probability is used to weigh the host-based attack graph, and the improved weighted betweenness index is calculated. Moreover, the entropy weight method is used to weigh the asset protection value index of the host nodes and calculate the asset protection value. Finally, the risk value of the network host node is calculated according to the maximum path attack probability and host importance. The experimental results show that the host node risk in the network environmentand the obtained risk value results are more rational.

Key words: network security, host-based attack graph, host importance, entropy weight method, risk assessment

CLC Number: