Performance Analysis of Scalable Attack Representation Models

被引:0
作者
Hong, Jin B. [1 ]
Kim, Dong Seong [1 ]
机构
[1] Univ Canterbury, Comp Sci & Software Engn, Christchurch 1, New Zealand
来源
SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS | 2013年 / 405卷
关键词
Attack Graph; Attack Tree; Complexity Analysis; Security Model; Scalability;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs (AGs) have been widely used for security analysis. The construction of the graph-based attack models including the AG have been studied, but the security evaluation considering the full attack paths cannot be computed using existing attack models due to the scalability problem. To solve this, we propose to use hierarchical attack representation models (HARMs). First, we formulate key questions that need to be answered to compare the scalability of existing attack models. We show the scalability of the HARMs via simulations, by taking into account practical attack scenario based on various network topologies.
引用
收藏
页码:330 / 343
页数:14
相关论文
共 23 条
  • [1] Albanese M, 2012, I C DEPEND SYS NETWO
  • [2] [Anonymous], 2008, Journal of Computing Sciences in Colleges
  • [3] [Anonymous], 2002, P 9 ACM C COMP COMM, DOI DOI 10.1145/586110.586140
  • [4] [Anonymous], THESIS
  • [5] [Anonymous], ESCTR2005054
  • [6] Chen F., 2010, J NETWORKS, V5
  • [7] A systematic approach to multi-stage network attack analysis
    Dawkins, J
    Hale, J
    [J]. SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 48 - 56
  • [8] Dewri R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P204
  • [9] Ewing GC, 1999, ESM'99 - MODELLING AND SIMULATION: A TOOL FOR THE NEXT MILLENNIUM, VOL 1, P175
  • [10] Using attack graphs to design systems
    Gupta, Suvajit
    Winstead, Joel
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (04) : 80 - 83