Have a personal or library account? Click to login
Network Threat Identification and Analysis Based on a State Transition Graph Cover

Network Threat Identification and Analysis Based on a State Transition Graph

By: Huiying Lv,  Yuan Zhang and  Jie Wang  
Open Access
|Dec 2013

Abstract

With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is proposed to accurately assess and master the current network security situation, and thereby preferably guide a dynamic defense. This method recognizes the current threats and predicts the subsequent threats by modeling attack scenarios and simulating attack state transferring. The threat identification model is called Attack State Transition Graph and Real-Time Attack State Graph, which is constructed by an Expanded Finite-State Automata. Based on the former possible threat paths, the state transitions can be illustrated and based on the latter, actually successful threats and threat paths are described. Then a threat identification algorithm is presented based on the above model. With this algorithm, various invalid threats are filtered; current valid threats are obtained by correlating the dynamic alarms with a static attack scenario. Further on, combining the Attack State Transition Graph with a Real-Time Attack State Graph, a possible next threat and a threat path can be identified and an attack target can also be predicted. Finally, the simulated results in an experimental network verify the feasibility and validity of the model and algorithm. This method provides a novel solution to evaluate and analyze the network security situation.

DOI: https://doi.org/10.2478/cait-2013-0037 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 51 - 61
Published on: Dec 31, 2013
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2013 Huiying Lv, Yuan Zhang, Jie Wang, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons License.