Netinfo Security ›› 2021, Vol. 21 ›› Issue (4): 62-72.doi: 10.3969/j.issn.1671-1122.2021.04.007

Previous Articles     Next Articles

Network Attack Path Analysis Method Based on Vulnerability Dynamic Availability

ZHANG Kai1,2,3, LIU Jingju1,3()   

  1. 1. College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
    2. Jiuquan Satellite Launch Center, Jiuquan 732750, China
    3. Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China
  • Received:2020-08-11 Online:2021-04-10 Published:2021-05-14
  • Contact: LIU Jingju E-mail:jingjul@aliyun.com

Abstract:

The existing network attack path analysis methods do not consider the dynamic characteristics of vulnerabilities, and do not consider the problem of vulnerability exploitation failure when describing the state transition caused by vulnerability exploitation. By modeling the change of vulnerability availability over time, this paper proposes an absorbing Markov chain model using an improved state transition probability calculation method. This method combines the actual situation of network attack and defense, fully considers the situation of vulnerability exploitation failure, and reasonably calculates the state transition probability. Firstly, the attack graph is generated for the target network, and the absorbing Markov chain is constructed based on calculating the vulnerability dynamic availability probability. Then, by using the properties of state transition probability matrix, the node threat ranking, the expected length of attack path and the path success probability are calculated and analyzed in time dimension. Experimental results show that the proposed method is more accurate in node threat ranking than the existing methods, and the calculation of the expected length of attack path and the path success probability is more consistent with the actual situation of network attack and defense.

Key words: absorbing Markov chain, attack path analysis, node threat ranking, expected length of attack path, path success probability

CLC Number: