会议专题

Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach

  It is possible that an invisible adversary can damage a physical component with the cyber-attacks such as in the Stuxnet,which plays a havoc demonstration in cyber-security.In this paper,we propose a cyber-attacks analysis model based on the Bayesian network approaches.By the construction of attack graph covering all possible atomic attacking paths,we utilize the Bayesian reasoning to deduce the success likelihood for all attacking paths and then make tracing to the most probable attack path with the Junction Tree algorithm to compute the posterior probability of a specific exploit relative to prior knowledge on attackers.Especially,vulnerability exploit possibility is quantified by weighing the environmental factors and the non-environmental factors based on cyberattack features.

cyber-attacks cyber-security Bayesian network attack graph exploit possibility

Yingying Huangfu Liang Zhou Chenming Yang

National Key Laboratory of Science and Technology on Communication,Center for Cyber Security,University of Electronic Science and Technology of China,Chengdu,China

国际会议

第九届网络分布式计算与知识发现国际会议( 2017 International Conference on Cyber-enabled distributed computing and knowledge discovery)

南京

英文

5-10

2017-10-12(万方平台首次上网日期,不代表论文的发表时间)