ArXiv TLDR

Dynamic Risk Assessment by Bayesian Attack Graphs and Process Mining

🐦 Tweet
2604.18080

Francesco Vitale, Simone Guarino, Stefano Perone, Massimiliano Rak, Nicola Mazzocca

cs.CRcs.LGcs.NI

TLDR

This paper proposes a dynamic cybersecurity risk assessment method combining Bayesian Attack Graphs with process mining to detect active vulnerability exploitation.

Key contributions

  • Combines Bayesian Attack Graphs (BAGs) with process mining for dynamic risk assessment.
  • Uses process mining to characterize malicious traffic and derive exploitation evidence.
  • Dynamically updates BAGs' conditional probabilities based on real-time evidence.
  • Validated on a cybersecurity testbed, effectively detecting active vulnerability exploitation.

Why it matters

Current attack graphs are static. This paper introduces a dynamic approach that uses real-time system behavior to update risk assessments. This allows for proactive detection of active threats, significantly improving cybersecurity posture and enabling timely responses to evolving attack patterns.

Original Abstract

While attack graphs are useful for identifying major cybersecurity threats affecting a system, they do not provide operational support for determining the likelihood of having a known vulnerability exploited, or that critical system nodes are likely to be compromised. In this paper, we perform dynamic risk assessment by combining Bayesian Attack Graphs (BAGs) and online monitoring of system behavior through process mining. Specifically, the proposed approach applies process mining techniques to characterize malicious network traffic and derive evidence regarding the probability of having a vulnerability actively exploited. This evidence is then provided to a BAG, which updates its conditional probability tables accordingly, enabling dynamic assessment of vulnerability exploitation. We apply our method to a cybersecurity testbed instantiating several machines deployed on different subnets and affected by several CVE vulnerabilities. The testbed is stimulated with both benign traffic and malicious behavior, which simulates network attack patterns aimed at exploiting the CVE vulnerabilities. The results indicate that our proposal effectively detects whether vulnerabilities are being actively exploited, allowing for an updated assessment of the probability of system compromise.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.