A vulnerability scan combined with information about a computer network can be used to create an attack graph, a model of how the elements of a network could be used in an attack to reach specific states or goals in the network. These graphs can be understood probabilistically by turning them into Bayesian attack graphs, making it possible to quantitatively analyse the security of large networks. In the event of an attack, probabilities on the graph change depending on the evidence discovered (e.g., by an intrusion detection system or knowledge of a host's activity). Since such scenarios are difficult to solve through direct computation, we discuss and compare three stochastic simulation techniques for updating the probabilities dynamically based on the evidence and compare their speed and accuracy. From our experiments we conclude that likelihood weighting is most efficient for most uses. We also consider sensitivity analysis of BAGs, to identify the most critical nodes for protection of the network and solve the uncertainty problem in the assignment of priors to nodes. Since sensitivity analysis can easily become computationally expensive, we present and demonstrate an efficient sensitivity analysis approach that exploits a quantitative relation with stochastic inference.
翻译:与计算机网络信息相结合的脆弱性扫描可以用来制作攻击图,这是在攻击中如何使用网络要素以达到网络中特定状态或目标的模型。这些图表可以通过将其转换成巴伊西亚攻击图来进行概率理解,从而有可能从数量上分析大型网络的安全性。如果发生攻击,根据所发现的证据(例如入侵探测系统或主机活动知识),图形变化的概率可以用来制作攻击图。由于这种情景很难通过直接计算解决,我们讨论并比较三种随机模拟技术,以便根据证据动态更新概率,并比较其速度和准确性。我们从我们的实验中得出结论,可能加权对多数用途最为有效。我们还考虑对BAGs的敏感性分析,以确定保护网络的最关键节点,并解决在指定前节点时的不确定性问题。由于敏感性分析很容易变得计算昂贵,我们提出并展示一种高效的敏感性分析方法,利用定量关系与随机推算。