An attack graph generation method based on parallel computing

Ningyuan Cao*, Kun Lv, Changzhen Hu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Attack graph is used as a model that enumerates all possible attack paths based on a comprehensive analysis of multiple network configurations and vulnerability information. An attack graph generation method based on parallel computing is therefore proposed to solve the thorny problem of calculations as the network scale continues to expand. We utilize multilevel k-way partition algorithm to divide network topology into parts in efficiency of parallel computing and introduce Spark into the attack graph generation as a parallel computing platform. After the generation, we have a tool named Monitor to regenerate the attack graph of the changed target network. The method can improve the speed of calculations to solve large and complex computational problems and save time of generating the whole attack graph when the network changed. The experiments which had been done show that the algorithm proposed to this paper is more efficient benefiting from smaller communication overhead and better load balance.

Original languageEnglish
Title of host publicationScience of Cyber Security - 1st International Conference, SciSec 2018, Revised Selected Papers
EditorsFeng Liu, Moti Yung, Shouhuai Xu
PublisherSpringer Verlag
Pages34-48
Number of pages15
ISBN (Print)9783030030254
DOIs
Publication statusPublished - 2018
Event1st International Conference on Science of Cyber Security, SciSec 2018 - Beijing, China
Duration: 12 Aug 201814 Aug 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11287 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Science of Cyber Security, SciSec 2018
Country/TerritoryChina
CityBeijing
Period12/08/1814/08/18

Keywords

  • Attack graph
  • Exploit
  • Multilevel k-way partition
  • Parallel computing
  • Vulnerability

Fingerprint

Dive into the research topics of 'An attack graph generation method based on parallel computing'. Together they form a unique fingerprint.

Cite this

Cao, N., Lv, K., & Hu, C. (2018). An attack graph generation method based on parallel computing. In F. Liu, M. Yung, & S. Xu (Eds.), Science of Cyber Security - 1st International Conference, SciSec 2018, Revised Selected Papers (pp. 34-48). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11287 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-030-03026-1_3