Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nowadays, networks are exposed to a set of risks and threats that can potentially cause damage and losses for companies. The security of networks must be assessed in order to measure the effectiveness of the protective measures that have been implemented. However, the impact of the dynamic behavior of these systems on the attacker's strategy is rarely considered. In this paper, we propose an attack graph-based solution that consider the evolution of system properties such as network topology changes, vulnerability discovery and patching, as well as attack detection and wiping of some system components. The topology of the attack graph evolves over time considering the evolution of the system state. Several simulations of the attacker infiltration in the system are performed by following the attack paths present in the attack graph in order to assess the security of the system. The proposed solution has been tested on a use case where a user is in remote work. By considering the changes in the network topology, new attack paths can be identified.

Original languageEnglish
Title of host publication5th Conference on Cloud and Internet of Things, CIoT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages24-31
Number of pages8
ISBN (Electronic)9781665479646
DOIs
Publication statusPublished - 1 Jan 2022
Event5th Conference on Cloud and Internet of Things, CIoT 2022 - Marrakech, Morocco
Duration: 28 Mar 202230 Mar 2022

Publication series

Name5th Conference on Cloud and Internet of Things, CIoT 2022

Conference

Conference5th Conference on Cloud and Internet of Things, CIoT 2022
Country/TerritoryMorocco
CityMarrakech
Period28/03/2230/03/22

Keywords

  • attack graph
  • dynamic system
  • network security
  • risk assessment
  • simulation

Fingerprint

Dive into the research topics of 'Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment'. Together they form a unique fingerprint.

Cite this