Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graphs analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building and simulations as well as an introductory use case are also outlined.

Conti, V., Ruffo, S.S., Merlo, A., Migliardi, M., Vitabile, S. (2018). A bio-inspired approach to attack graphs analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 63-76). Springer Verlag [10.1007/978-3-030-01689-0_5].

A bio-inspired approach to attack graphs analysis

Vitabile, Salvatore
2018-01-01

Abstract

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graphs analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building and simulations as well as an introductory use case are also outlined.
2018
Conti, V., Ruffo, S.S., Merlo, A., Migliardi, M., Vitabile, S. (2018). A bio-inspired approach to attack graphs analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 63-76). Springer Verlag [10.1007/978-3-030-01689-0_5].
File in questo prodotto:
File Dimensione Formato  
10.1007:978-3-030-01689-0_5.pdf

Solo gestori archvio

Descrizione: Pdf paper
Tipologia: Versione Editoriale
Dimensione 1.95 MB
Formato Adobe PDF
1.95 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
cover+index.pdf

Solo gestori archvio

Descrizione: Cover and Index
Tipologia: Altro materiale (es. dati della ricerca)
Dimensione 74.97 kB
Formato Adobe PDF
74.97 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10447/336144
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact