kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0003-0479-6766
KTH, School of Engineering Sciences (SCI), Mathematics (Dept.), Mathematics (Div.).
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-2764-8099
2024 (English)In: 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 466-473Conference paper, Published paper (Refereed)
Abstract [en]

Cyberinfrastructures are becoming larger and more complex, and it is increasingly challenging to assess for potential attacks and activate the appropriate defences. Attack graphs have been proven as a promising tool for risk assessment, but they also face the challenge of scalability. This paper proposes DefenceRank, an adaptation of Google's PageRank algorithm, to analyze large attack graphs and prioritize defences with low complexity. It incorporates the difficulty of the attack steps through the time-to-compromise parameter, the capabilities of the attack steps and the vulnerability of the assets. The proposed DefenceRank is evaluated on various realistic attack graphs. The results show that it achieves a reasonably high level of accuracy compared to optimal defence selection, while its time complexity increases polynomially with the size of the attack graph and remains in the order of seconds even for very large graphs and a large set of defences. In conclusion, DefenceRank demonstrates a viable alternative for the security assessment of cyberinfrastructures represented by attack graphs.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024. p. 466-473
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-356460DOI: 10.1109/CSR61664.2024.10679390ISI: 001327167900070Scopus ID: 2-s2.0-85206202681OAI: oai:DiVA.org:kth-356460DiVA, id: diva2:1914457
Conference
4th IEEE Annual International Conference on Cyber Security and Resilience (IEEE CSR), SEP 02-04, 2024, London, ENGLAND
Note

QC 20241119

Part of ISBN 979-8-3503-7536-7

Available from: 2024-11-19 Created: 2024-11-19 Last updated: 2024-11-19Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Fodor, Viktória

Search in DiVA

By author/editor
Patil, Rajendra ShivajiKällman, IsakFodor, Viktória
By organisation
Network and Systems EngineeringMathematics (Div.)
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 64 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf