2009 Cybersecurity Applications &Amp; Technology Conference for Homeland Security 2009
DOI: 10.1109/catch.2009.19
|View full text |Cite
|
Sign up to set email alerts
|

Advances in Topological Vulnerability Analysis

Abstract: Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(29 citation statements)
references
References 16 publications
0
29
0
Order By: Relevance
“…Tools to perform an attack graph based security analysis are described by Ou et al (2005); Lippmann et al (2006); Noel et al (2009);Jajodia et al (2011). It is typical for these approaches to separate the system model generation from the model analysis.…”
Section: Example 13mentioning
confidence: 99%
“…Tools to perform an attack graph based security analysis are described by Ou et al (2005); Lippmann et al (2006); Noel et al (2009);Jajodia et al (2011). It is typical for these approaches to separate the system model generation from the model analysis.…”
Section: Example 13mentioning
confidence: 99%
“…Another recent work combines attack trees with Markov processes [17]. Noel et al [18] insert a variety of information gathered by life-systems into their otherwise static attack graph based topological vulnerability analysis. While such works give static probabilities to events representing e.g.…”
Section: Introductionmentioning
confidence: 99%
“…MsAMS contributes to the field of Attack Graphs, an active area of research and development. For example, very recently two prominent approaches reviewed in Chapter 2 have turned commercial: NetSPA that became GARNET [229], and CAULDRON [155]. This is an indication that Attack Graphs, although not a silver bullet for information security, raise market as well as academic interest.…”
Section: Resultsmentioning
confidence: 99%
“…In this section, we evaluate this complexity using our benchmark of tests with practical values of n, similar to other authors in the field of Attack Graphs, e.g. [155,164].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation