A graph-theoretic visualization approach to network risk analysis

被引:0
作者
O'Hare, Scott [1 ]
Noel, Steven [2 ]
Prole, Kenneth [1 ]
机构
[1] Div Appl Vis Inc, Secure Decis, 6 Bayview Ave, Northport, NY USA
[2] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA USA
来源
VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS | 2008年 / 5210卷
关键词
network security; attack graph; exploit analysis; vulnerability assessment; visualization; situational awareness;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes a software system that provides significant new capabilities for visualization and analysis of network attack graphs produced through Topological Vulnerability Analysis (TVA). The TVA approach draws on a database of known exploits and system vulnerabilities to provide a connected graph representing possible cyber-attack paths within a given network. Our visualization approach builds on the extensive functionality of the yWorks suite of graphing tools, providing customized new capabilities for importing, displaying, and interacting with large scale attack graphs, to facilitate comprehensive network security analysis. These visualization capabilities include clustering of attack graph elements for reducing visual complexity, a hierarchical dictionary of attack graph elements, high-level overview with detail drill-down, interactive on-graph hardening of attacker exploits, and interactive graph layouts. This new visualization system is an integrated component of the CAULDRON attack graph tool developed at George Mason University.
引用
收藏
页码:60 / +
页数:2
相关论文
共 11 条
  • [1] AMMANN P, 2002, 9 ACM C COMP COMM SE
  • [2] JAJODIA S, 2008, TOPOLOGICAL VULNERAB
  • [3] NOEL S, 2004, WORKSH VIS DAT MIN C
  • [4] Ou X., 2006, P 13 ACM CCS
  • [5] Phillips C., 1998, NEW SEC PAR WORKSH
  • [6] Using model checking to analyze network vulnerabilities
    Ritchey, RW
    Ammann, P
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 156 - 165
  • [7] Sheyner Oleg, 2002, P IEEE S SEC PRIV
  • [8] WANG L, 2006, DATA APPL SECURITY, V20
  • [9] Minimum-cost network hardening using attack graphs
    Wang, Lingyu
    Noel, Steven
    Jajodia, Sushil
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (18) : 3812 - 3824
  • [10] WILLIAMS L, 2007, WORKSH VIS COMP SEC