Abstract
Software vulnerabilities in organizational computer networks can be leveraged by an attacker to gain access to sensitive information. As fixing all vulnerabilities requires much effort, it is critical to rank the possible fixes by their importance. Centrality measures over logical attack graphs, or over the network connectivity graph, often provide a scalable method for finding the most critical vulnerabilities. In this paper we suggest an analysis of the planning graph, originating in classical planning, as an alternative for the logical attack graph, to improve the ranking produced by centrality measures. The planning graph also allows us to enumerate the set of possible attack plans, and hence, directly count the number of attacks that use a given vulnerability. We evaluate a set of centrality-based ranking measures over the logical attack graph and the planning graph, showing that metrics computed over the planning graph reduce more rapidly the set of shortest attack plans.
Original language | English |
---|---|
DOIs | |
State | Published - 17 Sep 2018 |
Event | The 4th Global Conference on Artificial Intelligence (GCAI 2018) - , Luxembourg Duration: 17 Sep 2018 → 19 Sep 2018 https://easychair.org/smart-program/LuxLogAI2018/GCAI-index.html |
Conference
Conference | The 4th Global Conference on Artificial Intelligence (GCAI 2018) |
---|---|
Country/Territory | Luxembourg |
Period | 17/09/18 → 19/09/18 |
Internet address |