在支持管理程序的IaaS云网络中,基于边缘聚合的网络攻击贝叶斯建模

Aaron Zimba, Chen Hongsong, Wang Zhao-shun
{"title":"在支持管理程序的IaaS云网络中,基于边缘聚合的网络攻击贝叶斯建模","authors":"Aaron Zimba, Chen Hongsong, Wang Zhao-shun","doi":"10.1109/ICCT.2017.8359847","DOIUrl":null,"url":null,"abstract":"The Infrastructure as a Service (IaaS) offering of cloud computing has come to alleviate some of the challenges associated with infrastructural investments and other related costs for enterprise users. However, hypervisor networks in IaaS environments are not immune to security breaches as the components therein tend to exhibit vulnerabilities which are exploited by attackers. Attackers chain together these vulnerabilities for effective attack path traversal in a given attack. The challenge has not been in identifying the vulnerable components but in capturing the dependencies amongst the vulnerabilities and statistically evaluating the effect exerted by one vulnerability unto another. In this paper, we capture the dependencies between vulnerabilities in hypervisor networks by aggregating incoming attack edges via disjunction and conjunction of attack events in the resultant Bayesian attack network. We illustrate the use of local conditional probabilities distributions at a given node to evaluate the likelihood of node exploitation for attack propagation under varying conditions. We further identify critical nodes and edges without which a given attack will not materialize and show how a security analyst can use such in the security mitigation process. We model the security status of the target node using a finite state machine where state transitions are induced by attack instances in the aggregated critical edge.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Edge aggregation based Bayesian modeling of cyber attacks in hypervisor-enabled IaaS cloud networks\",\"authors\":\"Aaron Zimba, Chen Hongsong, Wang Zhao-shun\",\"doi\":\"10.1109/ICCT.2017.8359847\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Infrastructure as a Service (IaaS) offering of cloud computing has come to alleviate some of the challenges associated with infrastructural investments and other related costs for enterprise users. However, hypervisor networks in IaaS environments are not immune to security breaches as the components therein tend to exhibit vulnerabilities which are exploited by attackers. Attackers chain together these vulnerabilities for effective attack path traversal in a given attack. The challenge has not been in identifying the vulnerable components but in capturing the dependencies amongst the vulnerabilities and statistically evaluating the effect exerted by one vulnerability unto another. In this paper, we capture the dependencies between vulnerabilities in hypervisor networks by aggregating incoming attack edges via disjunction and conjunction of attack events in the resultant Bayesian attack network. We illustrate the use of local conditional probabilities distributions at a given node to evaluate the likelihood of node exploitation for attack propagation under varying conditions. We further identify critical nodes and edges without which a given attack will not materialize and show how a security analyst can use such in the security mitigation process. We model the security status of the target node using a finite state machine where state transitions are induced by attack instances in the aggregated critical edge.\",\"PeriodicalId\":199874,\"journal\":{\"name\":\"2017 IEEE 17th International Conference on Communication Technology (ICCT)\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 17th International Conference on Communication Technology (ICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT.2017.8359847\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT.2017.8359847","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

云计算的基础设施即服务(IaaS)产品减轻了企业用户与基础设施投资和其他相关成本相关的一些挑战。然而,IaaS环境中的虚拟机监控程序网络也不能幸免于安全漏洞,因为其中的组件往往会显示出被攻击者利用的漏洞。攻击者将这些漏洞链接在一起,以便在给定的攻击中有效地遍历攻击路径。挑战不在于识别易受攻击的组件,而在于捕获漏洞之间的依赖关系,并统计地评估一个漏洞对另一个漏洞所产生的影响。在本文中,我们通过在最终的贝叶斯攻击网络中通过分离和连接攻击事件来聚合入侵攻击边,从而捕获管理程序网络中漏洞之间的依赖关系。我们演示了在给定节点上使用局部条件概率分布来评估节点在不同条件下利用攻击传播的可能性。我们进一步确定了关键节点和边缘,没有这些节点和边缘,给定的攻击就不会实现,并展示了安全分析师如何在安全缓解过程中使用这些节点和边缘。我们使用有限状态机对目标节点的安全状态进行建模,其中状态转换由聚合临界边缘上的攻击实例引起。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Edge aggregation based Bayesian modeling of cyber attacks in hypervisor-enabled IaaS cloud networks
The Infrastructure as a Service (IaaS) offering of cloud computing has come to alleviate some of the challenges associated with infrastructural investments and other related costs for enterprise users. However, hypervisor networks in IaaS environments are not immune to security breaches as the components therein tend to exhibit vulnerabilities which are exploited by attackers. Attackers chain together these vulnerabilities for effective attack path traversal in a given attack. The challenge has not been in identifying the vulnerable components but in capturing the dependencies amongst the vulnerabilities and statistically evaluating the effect exerted by one vulnerability unto another. In this paper, we capture the dependencies between vulnerabilities in hypervisor networks by aggregating incoming attack edges via disjunction and conjunction of attack events in the resultant Bayesian attack network. We illustrate the use of local conditional probabilities distributions at a given node to evaluate the likelihood of node exploitation for attack propagation under varying conditions. We further identify critical nodes and edges without which a given attack will not materialize and show how a security analyst can use such in the security mitigation process. We model the security status of the target node using a finite state machine where state transitions are induced by attack instances in the aggregated critical edge.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Chemical substance classification using long short-term memory recurrent neural network One-way time transfer for large area through tropospheric scatter Application feature extraction by using both dynamic binary tracking and statistical learning Research on multi-target resolution process with the same beam of monopulse radar Pedestrian detection based on Visconti2 7502
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1