Authors: Shailendra Mishra; Waleed Bander Alotaibi; Mohammed Alshehri; Sharad Saxena
Addresses: Department of Computer Engineering, Majmaah University, Majmaah-11952, Riyadh, Saudi Arabia ' Department of Information Technology, Majmaah University, Majmaah-11952, Riyadh, Saudi Arabia ' Department of Information Technology, Majmaah University, Majmaah-11952, Riyadh, Saudi Arabia ' Department of Computer Science & Engineering, Thapar Institute of Engineering & Technology, Patiala, Punjab, India
Abstract: In network security, various protocols exist, but these cannot be said to be secure. Many hackers and illegal agents try to take advantage of the vulnerabilities through various incremental penetrations that can compromise critical systems. The conventional tools available for this purpose are not enough to handle things as desired. Risks are always present with dynamically evolving networks and are very likely to lead to serious incidents. This research work has proposed a model to visualise and predict cyber-attacks in complex, multilayered networks. All the available network security conditions and the possible places where an attacker can exploit the system are summarised. The vulnerability-based multi-graph technique for the attacker is presented. Also, an attack graph algorithm is proposed, leading to identifying all the vulnerable paths that can be used to harden the network by placing sensors at the desired locations and is used for vulnerability assessment of Multi-Stage Cyber-Attacks.
Keywords: network vulnerability; attack graph; adjacency matrix; clustering technique; cyber defence.
International Journal of Computer Applications in Technology, 2022 Vol.68 No.4, pp.345 - 356
Received: 01 Jun 2021
Accepted: 06 Jul 2021
Published online: 01 Sep 2022 *