An approach to model network exploitations using exploitation graphs

被引:12
作者
Li, We
Vaughn, Rayford B.
Dandass, Yoginder S.
机构
[1] Nova SE Univ, Grad Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
[2] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
来源
SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL | 2006年 / 82卷 / 08期
关键词
exploitation graph (e-graph); vulnerability graph; graph-based modeling; computer security;
D O I
10.1177/0037549706072046
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs (e-graphs) that are used to represent attack scenarios. Experiments carried out in a cluster computing environment showed the usefulness of proposed techniques in providing in-depth attack scenario analyses for security engineering. Critical vulnerabilities can be identified by employing graph algorithms. Several factors were used to measure the difficulty in executing an attack. A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios. The authors also show how the attack scenario analyses better help deployment of security products and design of network topologies.
引用
收藏
页码:523 / 541
页数:19
相关论文
共 34 条
  • [1] Ammann P., 2002, 9 ACM C COMPUTER COM, DOI DOI 10.1145/586110.586140
  • [2] Berard B., 2001, SYSTEMS SOFTWARE VER
  • [3] Chartrand G., 2016, GRAPHS DIGRAPHS
  • [4] Modeling multistep cyber attacks for scenario recognition
    Cheung, S
    Lindqvist, U
    Fong, MW
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 284 - 292
  • [5] Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
  • [6] DAS K, 2000, THESIS MIT
  • [7] JAJODIA S, 2003, MANAGING CYBER THREA
  • [8] Two formal analyses of attack graphs
    Jha, S
    Sheyner, O
    Wing, J
    [J]. 15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 49 - 63
  • [9] DARPA information assurance program dynamic defense experiment summary
    Kewley, DL
    Bouchard, JF
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 331 - 336
  • [10] KUMAR S, 1995, THESIS PURDUE U W LA