Attack graphs in cyber security
The frequency of cyber attacks and the possible damages they can cause, demand systematic and reliable approaches to address security issues. A highly valuable method that is preventing the occurrence of attacks, by exploiting vulnerabilities and detecting those attack scenarios that are most likely to happen, is “attack graphs”.
- a thorough assessment of vulnerabilities of cyber assets;
- a continuously forecast and evaluation of probabilities of cyber-attacks;
- management of relevant warnings related to potential upcoming attacks and vulnerabilities; and
- forecasting and propagation of cascading effects of attacks across supply chain services.
Attack graphs are significant in this area, as they represent the possible attack paths inside a network topology. They are represented as directed, acyclic graphs, that can be constructed by knowing the target network topology, including the communication rules, as well as the list of possible vulnerabilities. Before creating the graph, a reachability analysis and an attack template establishment are conducted. A reachability analysis provides a computation of the reachability conditions among network nodes, while the establishment of an attack template describes the elements of various attacks, the conditions for the elements of an attack and the relations among them.
Where can you use attack graphs?
The possibilities for usage are versatile. Besides vulnerability analysis and attack path prediction, an attack graph can be also helpful in selecting the nodes, whose security needs to be hardened and used in an uncertainty analysis. There is a variety of different methods that can be used for attack graph analysis. The selection of the most appropriate one depends on the goals intended to achieve. For instance, two commonly used probability-based models are Bayesian networks and Markov models. Bayesian networks represent a suitable manner to identify nodes that are at high risk of attacks, in order to reinforce them, where Markov models are frequently used for attack behavior prediction and detection of most likely attack paths. Additionally, there is a wide range of analysis techniques applicable for these models, that enable deriving different sets of conclusions.
The use of attack graphs with appropriate analysis methods can be of great value for network topology security properties investigation. Attack graph analysis methods are developing continuously, aiming to address the emerging issues and dynamic nature of attacks. Understanding the nature of attack graphs and applying an appropriate analysis method can be of great value for network security evaluation and possible attacks predictions.
Are you familiar with attack graphs as a user or as a developer? What do you think about their effectiveness? CYRENE is organizing its first Hackathon and graph analysis is part of the technologies and methodologies to be explored. Interested? Sign up here!
Don’t forget to subscribe to our Newsletter for regular updates!
This blog is signed by: The UNSPMF team
Project Coordinator: Sofoklis Efremidis
Institution: Maggioli SPA
Duration: 36 months
Participating organisations: 14
Number of countries: 10
Second day of the @CYRENE_H2020 plenary session is finishing with a very interesting presentation on Interpol's #Cybercrime Knowledge Exchange platform, that our ethics expert partner #Privanova just joined! https://t.co/QXeY2X1XVRRead More
How familiar are you with the power of semantic modelling using ontologies? Our latest blog is freshly published in our website! Check it out here and let us know what you think!Read More
@SPHYNXTS participated in the “Career Day: Meet the companies” virtual event, organized by the Graduate Student's Association of Computer Science Department of the Uni of Crete. The @CYRENE_H2020 was disseminated to more than 90 participants in the academic and industry fields. https://t.co/TCkX...Read More
@SifisHome @WIRED @clamorelli Congratulations! And a very interesting article! 👏👏👏Read More
This project has received funding from the European Union’s Horizon 2020 Research and Innovation program under grant agreement No 952690. The website reflects only the view of the author(s) and the Commission is not responsible for any use that may be made of the information it contains.