Proceedings of the 13th ACM Conference on Computer and Communications Security 2006
DOI: 10.1145/1180405.1180446
|View full text |Cite
|
Sign up to set email alerts
|

A scalable approach to attack graph generation

Abstract: Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of the graph generating process, and there is often a lack of logical formalism in the representation of attack graphs, which results in the attack graph being difficult to use and understand by human beings. Pioneer work by Sheyner, et al. is the first attack-graph tool based on formal logical techniques, namely model-checking. However, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
320
0
2

Year Published

2008
2008
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 469 publications
(324 citation statements)
references
References 15 publications
2
320
0
2
Order By: Relevance
“…Less closely related is the work on efficient generation of attack graphs [6][7][8][9][10]. These do not, however, explicitly model network router and firewall configurations to calculate the end-to-end reachability matrix, and do not focus on the problem of defining an aggregate impact metric.…”
Section: Related Workmentioning
confidence: 99%
“…Less closely related is the work on efficient generation of attack graphs [6][7][8][9][10]. These do not, however, explicitly model network router and firewall configurations to calculate the end-to-end reachability matrix, and do not focus on the problem of defining an aggregate impact metric.…”
Section: Related Workmentioning
confidence: 99%
“…Some vulnerabilities are more significant than others. Tools such as Attack Graphs [11] can be used to determine priority categories for all known vulnerabilities. The Common Vulnerability Scoring System (CVSS) [15] is another suggested mechanism for prioritizing known vulnerabilities.…”
Section: Restoration Time 7bmentioning
confidence: 99%
“…Assumption of cost of launching attacks to be equal is one of drawbacks of the system as it varies to a great extend in practical scenarios (L. Wang, Singhal, & Jajodia, 2007b). As network infrastructure becomes large, attack graphs become larger and complex (Ou, Boyer, & McQueen, 2006) . In order to handle and generate larger attack graphs, scalable analysis is required incorporating probabilistic knowledge of behavior of attacker (L. Wang, Singhal, & Jajodia, 2007a;Xie, Wen, Zhang, Hu, & Chen, 2009).…”
Section: Introductionmentioning
confidence: 99%