skip to main content
10.1145/3154273.3154324acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Using Bounded Binary Particle Swarm Optimization to Analyze Network Attack Graphs

Published:04 January 2018Publication History

ABSTRACT

Binary particle swarm optimization (BPSO) is a technique widely used to solve combinatorial problems. In this paper, we propose a variant of BPSO to find most likely attack paths in an attack graph. The aim is to find an attack path with the highest attack probability and least path length. In such combinatorial optimization problem, the set of feasible solutions is usually discrete and an exhaustive search may lead to unnecessary examination of those segments of the search space, which are assured to not include a solution. The paper introduces the concept of bounding the solution space of BPSO. The minimum and maximum value of each objective called bound of the solution is computed. The search space of BPSO is restricted within these solution bounds and hence we name our approach as bounded binary particle swarm optimization (BBPSO). By bounding the solution space, those particles of BPSO which are guaranteed to be infeasible are not considered for feasibility check. Experimental results show that the proposed approach provide a 50 percent performance improvement as compared to the conventional BPSO.

References

  1. M. Abadi and S. Jalili. 2008. Using Binary Particle Swarm Optimization for Minimization Analysis of Large-scale Network Attack Graphs. In Scientia Iranica, Vol. 15. London, 605--619.Google ScholarGoogle Scholar
  2. Daniel Bilar. 2003. Quantitative Risk Analysis of Computer Networks. Ph.D. Dissertation. Hanover, NH, USA. AAI3114255. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. W. Dijkstra. 1959. A Note on Two Problems in Connexion with Graphs. Numer. Math. 1, 1 (Dec. 1959), 269--271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Kennedy and R. C. Eberhart. 1995. Particle Swarm Optimization. In International. Journal on Bio-Inspired Computation, Vol. 2. Perth, Australia, 1942--1948.Google ScholarGoogle Scholar
  5. J. Kennedy and R. C. Eberhart. 1997. A Discrete Binary Version of the Particle Swarm Algorithm. In IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, Vol. 5. 4104--4108 vol.5.Google ScholarGoogle Scholar
  6. D. E. Knuth. 1997. The Art of Computer Programming, Volume 1 (3rd Ed.): Fundamental Algorithms. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham. 2006. Validating and Restoring Defense in Depth using Attack Graphs. In IEEE Conference on Military Communications (MILCOM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M.Alhomidi and M.Reed. 2013. A Genetic Algorithm Approach for the Most Likely Attack Path Problem. In Availability, Reliability and Security (ARES) Eighth International Conference. Regensburg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M.Alhomidi and M.Reed. 2013. Risk Assessment and Analysis through Population-based Attack Graph Modelling. In Internet Security (World- CIS) World Congress. London.Google ScholarGoogle ScholarCross RefCross Ref
  10. V. Mehta, C. Bartzis, H. Zhu, E. M. Clarke, and J.M.Wing. 2006. Ranking Attack Graphs. In Recent Advances in Intrusion Detection. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. mnemonic. 2017. Security Report 2017. https://https://www.mnemonic.no/security_report/. (2017). Online; Accessed: July 2017.Google ScholarGoogle Scholar
  12. S. Noel and S. Jajodia. 2014. Metrics Suite for Network Attack Graph Analytics. In CISR@. 5--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Pamula, S. Jajodia, P. Ammann, and V. Swarup. 2006. A Weakest-Adversary Security Metric for Network Configuration Security Analysis. In 2nd ACM Workshop on Quality of Protection. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Phillips and L. P. Swiler. 1998. A Graph-based System for Network Vulnerability Analysis. In IProceedings of the Workshop on New Security Paradigms. New York, USA, 71--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing. 2002. Automated Generation and Analysis of Attack Graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. Berkley, CA, USA, 273--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. O. Sheyner and J. M. Wing. 2004. Tools for Generating and Analyzing Attack Graphs. In Proceedings of Workshop on Formal Methods for Components and Objects. 344--371.Google ScholarGoogle Scholar
  17. L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia. 2008. An Attack Graph-Based Probabilistic Security Metric. In Proceeedings of the 22Nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Springer-Verlag, Berlin, Heidelberg, 283--296. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Govindavajhala X. Ou and A. W. Appel. 2005. Mulval: A Logic-based Network Security Analyzer. In In Usenix security. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Using Bounded Binary Particle Swarm Optimization to Analyze Network Attack Graphs

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICDCN '18: Proceedings of the 19th International Conference on Distributed Computing and Networking
          January 2018
          494 pages
          ISBN:9781450363723
          DOI:10.1145/3154273

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 January 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader