Routing the Cyber-Attack Path with the Bayesian Network Deducing Approach
It is possible that an invisible adversary can damage a physical component with the cyber-attacks such as in the Stuxnet,which plays a havoc demonstration in cyber-security.In this paper,we propose a cyber-attacks analysis model based on the Bayesian network approaches.By the construction of attack graph covering all possible atomic attacking paths,we utilize the Bayesian reasoning to deduce the success likelihood for all attacking paths and then make tracing to the most probable attack path with the Junction Tree algorithm to compute the posterior probability of a specific exploit relative to prior knowledge on attackers.Especially,vulnerability exploit possibility is quantified by weighing the environmental factors and the non-environmental factors based on cyberattack features.
cyber-attacks cyber-security Bayesian network attack graph exploit possibility
Yingying Huangfu Liang Zhou Chenming Yang
National Key Laboratory of Science and Technology on Communication,Center for Cyber Security,University of Electronic Science and Technology of China,Chengdu,China
国际会议
南京
英文
5-10
2017-10-12(万方平台首次上网日期,不代表论文的发表时间)