2022
DOI: 10.3390/electronics11091332
|View full text |Cite
|
Sign up to set email alerts
|

Attack Graph Generation with Machine Learning for Network Security

Abstract: Recently, with the discovery of various security threats, diversification of hacking attacks, and changes in the network environment such as the Internet of Things, security threats on the network are increasing. Attack graph is being actively studied to cope with the recent increase in cyber threats. However, the conventional attack graph generation method is costly and time-consuming. In this paper, we propose a cheap and simple method for generating the attack graph. The proposed approach consists of learni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…Attack Tree from [16] overview of the automatic generation of Attack Models than the other surveys, since it is the first survey focusing on this particular field. To be more specific, the automatic generation of Attack Trees is only studied in [39], where all the papers referring to Attack Graphs are not considered- [3], [6], [13], [14], [18], [28], [29], [34]- [37], we consider all of the above papers. Also, the following papers which generate Attack Tree are not considered- [7], [12], [17], [22], [32] in [39], we on the other hand consider all the papers mentioned above.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Attack Tree from [16] overview of the automatic generation of Attack Models than the other surveys, since it is the first survey focusing on this particular field. To be more specific, the automatic generation of Attack Trees is only studied in [39], where all the papers referring to Attack Graphs are not considered- [3], [6], [13], [14], [18], [28], [29], [34]- [37], we consider all of the above papers. Also, the following papers which generate Attack Tree are not considered- [7], [12], [17], [22], [32] in [39], we on the other hand consider all the papers mentioned above.…”
Section: Related Workmentioning
confidence: 99%
“…None of the papers in this category are presenting proofs or the scalability of their approach. Koo et al [18] introduces a method to support the generation of an attack graph using Deep Learning and Machine Learning. The final model takes as an input the network topology and the system information.…”
Section: E Artificial Intelligencementioning
confidence: 99%
See 1 more Smart Citation
“…When implementing an attack, it needs to meet certain conditions, such as reachability and accessibility. Note that the security knowledge base needs to fully express the conditions for vulnerability exploitation and the risk factors after the successful exploitation of vulnerabilities, which are often expressed through attack graphs in mainstream approaches [17].…”
Section: Ontology Design For Defense Strategy Recommendationsmentioning
confidence: 99%
“…However, due to its open connectivity, CPSs have become the target of malicious attackers. Eavesdropping attack is one of the typical network attacks [5,6]. The security of CPSs has received a lot of attention, among which confidentiality is a basic security issue [7].…”
Section: Introductionmentioning
confidence: 99%