Implement edge pruning to enhance attack graph generation using the naïve approach algorithm

Al-Araji, Zaid J. and Mutlag, Ammar Awad and Syed Ahmad, Sharifah Sakinah (2024) Implement edge pruning to enhance attack graph generation using the naïve approach algorithm. El-Cezeri Journal of Science and Engineering, 11 (3). pp. 298-306. ISSN 2148-3736

[img] Text
00896311220241156321571.pdf

Download (700kB)

Abstract

The use of network technologies has increased in recent years. Although the network is beneficial for individuals to work and live in, it does have security challenges that should be rectified. One of these issues is cyberattacks. The attack surface for hackers is growing as more devices are linked to the internet. The next generation cyber defence concentrating on predictive analysis seems more proactive than existing technologies based on intrusion detection. Recently, many approaches have been proposed to detect and predict attacks; one of these approaches is attack graphs. The main reason for designing the attack graph is to predict the attack as well as to predict the attack’s next step in the network. The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. The attack graph is categorized into three sections: generation, analysis, and use of attack graph. However, current attack graphs are suffering from a few issues. Scalability is the main issue the attack graph generation is facing. The reason for this issue is that the increase in the usage of devices connected to the network leads to increased vulnerabilities in the network, which leads to an increment in the complexity as well as generation time of the attack graph. For this issue, this study proposes using the naïve approach prune algorithm and using Personal agents to reduce the reachability time in calculating between the nodes and to remove unnecessary edges, minimizing the attack graph’s complexity. For the results, the proposed attack graph performs better than the existing attack graph by using a naïve approach and a personal agent. The proposed attack graph reduced the generation time by 20 percent and the attack graph complexity.

Item Type: Article
Uncontrolled Keywords: Attack Graph, Fog computing, Cloud computing, Edge Computing, Edge Pruning
Divisions: Faculty of Information and Communication Technology
Depositing User: Norfaradilla Idayu Ab. Ghafar
Date Deposited: 05 Feb 2025 15:40
Last Modified: 05 Feb 2025 15:40
URI: http://eprints.utem.edu.my/id/eprint/28374
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item