Time-Efficient and Cost-Effective Network Hardening Using Attack Graphs

被引:0
作者
Albanese, Massimiliano [1 ]
Jajodia, Sushil [1 ]
Noel, Steven [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
来源
2012 42ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) | 2012年
关键词
network hardening; vulnerability analysis; attack graphs; intrusion prevention; reliability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack graph analysis has been established as a powerful tool for analyzing network vulnerability. However, previous approaches to network hardening look for exact solutions and thus do not scale. Further, hardening elements have been treated independently, which is inappropriate for real environments. For example, the cost for patching many systems may be nearly the same as for patching a single one. Or patching a vulnerability may have the same effect as blocking traffic with a firewall, while blocking a port may deny legitimate service. By failing to account for such hardening interdependencies, the resulting recommendations can be unrealistic and far from optimal. Instead, we formalize the notion of hardening strategy in terms of allowable actions, and define a cost model that takes into account the impact of interdependent hardening actions. We also introduce a near-optimal approximation algorithm that scales linearly with the size of the graphs, which we validate experimentally.
引用
收藏
页数:12
相关论文
共 18 条
[1]  
[Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
[2]  
Dacier M., 1994, THESIS I NATL POLYTE
[3]  
Jajodia S, 2005, MASSIVE COMP, V5, P247, DOI 10.1007/0-387-24230-9_9
[4]  
Jajodia S, 2011, P MIL COMM C MILCOM, DOI 10.1109/MILCOM.2011.6127490
[5]  
Jha S., 2002, P 15 IEEE COMP SEC F
[6]  
Noel S., 2004, Proceedings. 20th Annual Computer Security Applications Conference, P350
[7]  
Noel S., 2004, VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, New York, NY, USA, P109
[8]   Experimenting with quantitative evaluation tools for monitoring operational security [J].
Ortalo, R ;
Deswarte, Y ;
Kaâniche, M .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (05) :633-650
[9]  
Phillips C, 1999, NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, P71
[10]  
Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189