Using genetic algorithm for optimal security hardening in risk flow attack graph

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.

Cite

CITATION STYLE

APA

Dai, F., Zheng, K., Binwu, & Luo, S. (2015). Using genetic algorithm for optimal security hardening in risk flow attack graph. KSII Transactions on Internet and Information Systems, 9(5), 1920–1937. https://doi.org/10.3837/tiis.2015.05.021

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free