Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2015, Vol. 38 ›› Issue (1): 82-86.doi: 10.13190/j.jbupt.2015.01.016

• Reports • Previous Articles     Next Articles

Approach of Goal-Oriented Attack Graph-Based Threat Evaluation for Network Security

LIU Wei-xin1, ZHENG Kang-feng1, HU Ying2, WU Bin1   

  1. 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2. Armed Police Beijing Command Academy, Beijing 100012, China
  • Received:2014-04-01 Online:2015-02-28 Published:2015-03-30

Abstract:

For being not falling in as final targets of attackers, the critical resources in network environments should be protected. It is vital to quantify the threat and impact during the process of multi-stage attacks. Aiming at combine threat quantification of individual attack action and significance value of hosts, as well as large amount of attack dependencies in attack graphs, a methodology for threat evaluation was proposed. The bi-directional threat evaluation presented in this article is able to compute progress attackers already, as well as the threat to goal-resources in attack graph, which can be well applied to real-time attack threat evaluation. The proposed was finally verified in experiment and simulation.

Key words: threat situation, attack graph, bi-directional threat evaluation

CLC Number: