Ranking Attack Graphs with Graph Neural Networks

  • Liang Lu
  • Rei Safavi-Naini
  • Markus Hagenbuchner
  • Willy Susilo
  • Jeffrey Horton
  • Sweah Liang Yong
  • Ah Chung Tsoi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5451)


Network security analysis based on attack graphs has been applied extensively in recent years. The ranking of nodes in an attack graph is an important step towards analyzing network security. This paper proposes an alternative attack graph ranking scheme based on a recent approach to machine learning in a structured graph domain, namely, Graph Neural Networks (GNNs). Evidence is presented in this paper that the GNN is suitable for the task of ranking attack graphs by learning a ranking function from examples and generalizes the function to unseen possibly noisy data, thus showing that the GNN provides an effective alternative ranking method for attack graphs.


Hide Layer Machine Learning Approach Ranking Scheme PageRank Algorithm Attack Graph 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bhadeshia, University Of Cambridge. Neural Networks in Materials ScienceGoogle Scholar
  2. 2.
    Mizutani, E., Dreyfus, S.E.: On complexity analysis of supervised MLP-learning for algorithmic comparisons. In: International Joint Conference on Neural Networks (IJCNN), vol. 1 (2001)Google Scholar
  3. 3.
    Scarselli, F., Tsoi, A.C., Gori, M., Hagenbuchner, M.: A new neural network model for graph processing. Technical Report DII 1/05, University of Siena (August 2005)Google Scholar
  4. 4.
    Scarselli, F., Yong, S.L., Hagenbuchner, M., Tsoi, A.C.: Adaptive Page Ranking with Neural Networks. In: WWW (Special interest tracks and posters), pp. 936–937 (2005)Google Scholar
  5. 5.
    Frasconi, P., Gori, M., Sperduti, A.: A general framework for adaptive processing of data structures 9(5), 768–786 (September 1998)Google Scholar
  6. 6.
    Haykin, S.: Neural Networks, A Comprehensive Foundation. Macmillan College Publishing Company, Inc., 866 Third Avenue, New York, 10022 (1994)Google Scholar
  7. 7.
    Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Networks 2(5), 359–366 (1989)CrossRefGoogle Scholar
  8. 8.
    Kemmerer, R.A., Catherine, M., Millen, J.K.: Three system for cryptographic protocol analysis. Cryptology 7(2), 79–130 (1994)zbMATHGoogle Scholar
  9. 9.
    Lu, L., Safavi-Naini, R., Horton, J., Susilo, W.: An adversary aware and intrusion detection aware attack model ranking scheme. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 65–86. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  10. 10.
    Bianchini, M., Gori, M., Scarselli, F.: Inside PageRank. ACM Transactions on Internet Technology 5(1), 92–118 (2001)CrossRefGoogle Scholar
  11. 11.
    Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (May 2002)Google Scholar
  12. 12.
    Scarselli, F., Gori, M., Tsoi, A.C., Hagenbuchner, M., Monfardini, G.: Computational capabilities of graph neural networks. IEEE Transactions on Neural Networks 20(1), 81–102 (2009)CrossRefGoogle Scholar
  13. 13.
    Scarselli, F., Yong, S.L., Gori, M., Hagenbuchner, M., Tsoi, A.C., Maggini, M.: Graph neural networks for ranking web pages. In: Web Intelligence Conference, pp. 666–672 (2005)Google Scholar
  14. 14.
    Tsoi, A.C., Hagenbuchner, M., Scarselli, F.: Computing customized page ranks. ACM Transactions on Internet Technology 6(4), 381–414 (2006)CrossRefGoogle Scholar
  15. 15.
    Mehta, V., Bartzis, C., Zhu, H., Clarke, E., Wing, J.M.: Ranking attack graphs. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 127–144. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Liang Lu
    • 1
  • Rei Safavi-Naini
    • 2
  • Markus Hagenbuchner
    • 1
  • Willy Susilo
    • 1
  • Jeffrey Horton
    • 1
  • Sweah Liang Yong
    • 1
  • Ah Chung Tsoi
    • 3
  1. 1.University of WollongongWollongongAustralia
  2. 2.Department of Computer ScienceUniversity of CalgaryCanada
  3. 3.Hong Kong Baptist UniversityKowloonHong Kong

Personalised recommendations