loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sudip Misra 1 ; Mohammad S. Obaidat 2 ; Atig Bagchi 1 ; Ravindara Bhatt 1 and Soumalya Ghosh 1

Affiliations: 1 Indian Institute of Technology, India ; 2 Monmouth University, United States

Keyword(s): Attack Graph, Connectivity Matrix, Privilege Matrix, Fuzzy Logic Clustering, Computer Network Security.

Related Ontology Subjects/Areas/Topics: Data and Systems Security ; Information and Systems Security

Abstract: Modern networks have been growing rapidly in size and complexity, making manual vulnerability assessment and mitigation impractical. Automation of these tasks is desired (Obaidat and Boudriga, 2007; Bhattacharya et al., 2008). Existing network security tools can be classified into the following two approaches: proactive (such as vulnerability scanning and use of firewalls) and reactive (intrusion detection system). The modus operandi of proactive approaches have an edge over the reactive ones as they have threat information prior to the attack. One approach, viz., generation and analysis of attack graphs, in this class has gained popularity. In this paper, we present an algorithm to automatically generate attack graphs based on the prevalent network conditions. The nodes in the graph that are generated by executing our proposed algorithm have been grouped based on logical graph paradigm which helps in visualizing the dependencies among various initial and generated network configurat ions towards obtaining the attacker’s goal. In addition, fuzzy logic based clustering has been applied on the generated data corresponding to each such group. This form of clustering is beneficial, because in the real world the boundaries between clusters are indistinct. This form of clustering leads to better visualization of the attack graph. Our goal is to design and develop an efficient approach for automatic attack graph generation and visualization. The approach uses attack graph generation algorithm, and requires network initial conditions as input. Fuzzy logic based clustering, Fuzzy C-Means (FCM) (Bezdek, 1981), is applied at the output of attack graph generation algorithm to improve visualization. Our approach helps network administrator to visualize attack graph in an efficient way. This reduces the burden of network administrator to a larger extent. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.217.228.35

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Misra, S.; Obaidat, M.; Bagchi, A.; Bhatt, R. and Ghosh, S. (2009). ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING. In Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT; ISBN 978-989-674-005-4; ISSN 2184-3236, SciTePress, pages 92-98. DOI: 10.5220/0002277000920098

@conference{secrypt09,
author={Sudip Misra. and Mohammad S. Obaidat. and Atig Bagchi. and Ravindara Bhatt. and Soumalya Ghosh.},
title={ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT},
year={2009},
pages={92-98},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002277000920098},
isbn={978-989-674-005-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT
TI - ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING
SN - 978-989-674-005-4
IS - 2184-3236
AU - Misra, S.
AU - Obaidat, M.
AU - Bagchi, A.
AU - Bhatt, R.
AU - Ghosh, S.
PY - 2009
SP - 92
EP - 98
DO - 10.5220/0002277000920098
PB - SciTePress