Skip to main content

Ranking Attack Graphs with Graph Neural Networks

  • Conference paper
Information Security Practice and Experience (ISPEC 2009)

Abstract

Network security analysis based on attack graphs has been applied extensively in recent years. The ranking of nodes in an attack graph is an important step towards analyzing network security. This paper proposes an alternative attack graph ranking scheme based on a recent approach to machine learning in a structured graph domain, namely, Graph Neural Networks (GNNs). Evidence is presented in this paper that the GNN is suitable for the task of ranking attack graphs by learning a ranking function from examples and generalizes the function to unseen possibly noisy data, thus showing that the GNN provides an effective alternative ranking method for attack graphs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bhadeshia, University Of Cambridge. Neural Networks in Materials Science

    Google Scholar 

  2. Mizutani, E., Dreyfus, S.E.: On complexity analysis of supervised MLP-learning for algorithmic comparisons. In: International Joint Conference on Neural Networks (IJCNN), vol. 1 (2001)

    Google Scholar 

  3. Scarselli, F., Tsoi, A.C., Gori, M., Hagenbuchner, M.: A new neural network model for graph processing. Technical Report DII 1/05, University of Siena (August 2005)

    Google Scholar 

  4. Scarselli, F., Yong, S.L., Hagenbuchner, M., Tsoi, A.C.: Adaptive Page Ranking with Neural Networks. In: WWW (Special interest tracks and posters), pp. 936–937 (2005)

    Google Scholar 

  5. Frasconi, P., Gori, M., Sperduti, A.: A general framework for adaptive processing of data structures 9(5), 768–786 (September 1998)

    Google Scholar 

  6. Haykin, S.: Neural Networks, A Comprehensive Foundation. Macmillan College Publishing Company, Inc., 866 Third Avenue, New York, 10022 (1994)

    Google Scholar 

  7. Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Networks 2(5), 359–366 (1989)

    Article  Google Scholar 

  8. Kemmerer, R.A., Catherine, M., Millen, J.K.: Three system for cryptographic protocol analysis. Cryptology 7(2), 79–130 (1994)

    MATH  Google Scholar 

  9. Lu, L., Safavi-Naini, R., Horton, J., Susilo, W.: An adversary aware and intrusion detection aware attack model ranking scheme. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 65–86. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Bianchini, M., Gori, M., Scarselli, F.: Inside PageRank. ACM Transactions on Internet Technology 5(1), 92–118 (2001)

    Article  Google Scholar 

  11. Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2002)

    Google Scholar 

  12. Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G.: Computational capabilities of graph neural networks. IEEE Transactions on Neural Networks 20(1), 81–102 (2009)

    Article  Google Scholar 

  13. Scarselli, F., Yong, S.L., Gori, M., Hagenbuchner, M., Tsoi, A.C., Maggini, M.: Graph neural networks for ranking web pages. In: Web Intelligence Conference, pp. 666–672 (2005)

    Google Scholar 

  14. Tsoi, A.C., Hagenbuchner, M., Scarselli, F.: Computing customized page ranks. ACM Transactions on Internet Technology 6(4), 381–414 (2006)

    Article  Google Scholar 

  15. Mehta, V., Bartzis, C., Zhu, H., Clarke, E., Wing, J.M.: Ranking attack graphs. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 127–144. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lu, L. et al. (2009). Ranking Attack Graphs with Graph Neural Networks. In: Bao, F., Li, H., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2009. Lecture Notes in Computer Science, vol 5451. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00843-6_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00843-6_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00842-9

  • Online ISBN: 978-3-642-00843-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics