VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG)
Md Rakibul Hasan Talukder, Rakesh Podder, Indrajit Ray
2025
Abstract
Attack Graph (AG) analysis is a well-established technique to asses security threats in networked systems. However, traditional AGs primarily rely on coarse level vulnerability information from the Common Vulnerabilities and Exposures (CVE) repository for identifying attack paths and suggesting patch-based mitigation strategies. This approach presents significant limitations, including unavailability of patches, compatibility constraints, and system downtime, leaving security analysts without viable alternatives for optimized risk mitigation. To address this challenge, we propose two new paradigms: a novel knowledge-enriched AG framework and a Vulnerability Knowledge Graph (VKG). VKG incorporate fine-grained, structured vulnerability information that allows exploration of additional attack mitigation strategies beyond vulnerability patching in the AG analysis. We formally define VKG and AG along with algorithms for automated knowledge build-up, integration, and querying. To ensure seamless interoperability, we develop an interface that facilitates dynamic knowledge transfer between VKG and AG, enabling enhanced security reasoning without introducing inter-dependencies. We evaluate our methodology on a test network and demonstrate how the knowledge-driven AG can improve security decision-making by providing system administrators with adaptable, scenario-based defense mechanisms with actionable insights.
DownloadPaper Citation
in Harvard Style
Talukder M., Podder R. and Ray I. (2025). VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG). In Proceedings of the 22nd International Conference on Security and Cryptography - Volume 1: SECRYPT; ISBN 978-989-758-760-3, SciTePress, pages 420-428. DOI: 10.5220/0013526700003979
in Bibtex Style
@conference{secrypt25,
author={Md Talukder and Rakesh Podder and Indrajit Ray},
title={VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG)},
booktitle={Proceedings of the 22nd International Conference on Security and Cryptography - Volume 1: SECRYPT},
year={2025},
pages={420-428},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013526700003979},
isbn={978-989-758-760-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 22nd International Conference on Security and Cryptography - Volume 1: SECRYPT
TI - VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG)
SN - 978-989-758-760-3
AU - Talukder M.
AU - Podder R.
AU - Ray I.
PY - 2025
SP - 420
EP - 428
DO - 10.5220/0013526700003979
PB - SciTePress