Loading…

An ensemble approach for optimization of penetration layout in wide area networks

The complexity of IoT based networks and an exponential increase in new vulnerabilities has increased the demand for security assessment strategies manifold. Attack graphs or Penetration layouts play a paramount role to harden and analyze such complex networks. As the size of the network grows, admi...

Full description

Saved in:
Bibliographic Details
Published in:Computer communications 2021-06, Vol.174, p.61-74
Main Authors: Garg, Urvashi, Sikka, Geeta, Awasthi, Lalit K.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The complexity of IoT based networks and an exponential increase in new vulnerabilities has increased the demand for security assessment strategies manifold. Attack graphs or Penetration layouts play a paramount role to harden and analyze such complex networks. As the size of the network grows, administrators may find it difficult to comprehend penetration layout. In this article, we present a methodology to bridge the gap between large networks and penetration layouts leading to a strategy that automatically generates, optimizes, and improves visualization of penetration layout in large networks. More specifically, we take the network model as input to the designed simulator which analyzes the network and generates the penetration layout. Additionally, we have designed an algorithm to optimize the size of the penetration layout at various levels. This will also improve the visualization of the graph. We designed a simulator that uses a real-time network blueprint to visualize and analyze the effect and performance of the proposed approach. The results show that there is a lossless reduction in the size of penetration layout by 99.95% for the example real-time network.
ISSN:0140-3664
1873-703X
DOI:10.1016/j.comcom.2021.04.009