Multiobjective network security dynamic assessment method based on Bayesian network attack graph

IF 2.2 Q3 COMPUTER SCIENCE, CYBERNETICS
Jialiang Xie, Shanliang Zhang, Honghui Wang, Ming-zhu Chen
{"title":"Multiobjective network security dynamic assessment method based on Bayesian network attack graph","authors":"Jialiang Xie, Shanliang Zhang, Honghui Wang, Ming-zhu Chen","doi":"10.1108/ijicc-05-2023-0121","DOIUrl":null,"url":null,"abstract":"PurposeWith the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.Design/methodology/approachBased on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.FindingsThe experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.Originality/valueA method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.","PeriodicalId":45291,"journal":{"name":"International Journal of Intelligent Computing and Cybernetics","volume":" ","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Computing and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/ijicc-05-2023-0121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, CYBERNETICS","Score":null,"Total":0}
引用次数: 0

Abstract

PurposeWith the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.Design/methodology/approachBased on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.FindingsThe experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.Originality/valueA method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.
基于贝叶斯网络攻击图的多目标网络安全动态评估方法
随着互联网技术的快速发展,安全漏洞、数据泄露、网络诈骗、勒索软件等网络安全威胁日益突出,有组织、有目的的网络攻击增多,给网络安全防护带来了更多挑战。因此,迫切需要可靠的网络风险评估方法和有效的网络安全防护方案。基于攻击者和防御者的动态行为模式,构建了贝叶斯网络攻击图,提出了基于网络可用性、网络利用影响和漏洞攻击可能性的多目标风险动态评估模型。然后,提出了基于灰狼优化的自组织多目标进化算法。并利用该算法求解多目标风险评估模型,得到了多种不同的攻击策略。实验结果表明,该方法可以得到29种不同的攻击策略,并根据这些攻击策略得到攻击者的偏好。该方法有效地解决了涉及多决策变量的安全评估问题,为安全网络建设、安全加固和主动防御提供了建设性的指导。给出了网络风险评估方法的独创性/价值法。提出了基于网络可用性、网络利用影响和漏洞攻击可能性的多目标风险动态评估模型。实例验证了该方法在解决网络安全风险方面的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
6.80
自引率
4.70%
发文量
26
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信