2013
DOI: 10.3233/jcs-130475
|View full text |Cite
|
Sign up to set email alerts
|

Aggregating vulnerability metrics in enterprise networks using attack graphs

Abstract: Quantifying security risk is an important and yet difficult task in enterprise network security management. While metrics exist for individual software vulnerabilities, there is currently no standard way of aggregating such metrics. We present a model that can be used to aggregate vulnerability metrics in an enterprise network, producing quantitative metrics that measure the likelihood breaches can occur within a given network configuration. A clear semantic model for this aggregation is an important first ste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
62
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(63 citation statements)
references
References 38 publications
0
62
0
1
Order By: Relevance
“…In particular, humans (i) compare uncertain outcomes with a reference utility or cost, (ii) exhibit risk aversion in gains and risk seeking behavior in losses, and (iii) overweight losses compared to gains (loss aversion). A richer behavioral model, referred to as cumulative prospect theory [10], incorporates all these aspects in its cost function. However, in the setting of this paper, this richer model does not significantly change the cost functions of the defenders.…”
Section: The Behavioral Security Gamementioning
confidence: 99%
See 1 more Smart Citation
“…In particular, humans (i) compare uncertain outcomes with a reference utility or cost, (ii) exhibit risk aversion in gains and risk seeking behavior in losses, and (iii) overweight losses compared to gains (loss aversion). A richer behavioral model, referred to as cumulative prospect theory [10], incorporates all these aspects in its cost function. However, in the setting of this paper, this richer model does not significantly change the cost functions of the defenders.…”
Section: The Behavioral Security Gamementioning
confidence: 99%
“…In the context of large-scale interdependent systems, adversaries often use stepping-stone attacks to exploit vulnerabilities within the network in order to compromise a particular target [9]. Such threats can be captured via the notion of attack graphs that represent all possible paths that attackers may have to reach their targets within the CPS [10]. The defenders in such systems are each responsible for defending some subset of the assets [2,11] with their limited resources.…”
Section: Introductionmentioning
confidence: 99%
“…CySeMoL, the tool P 2 CySeMoL bases some of its logic on, is presented in Section 3.1. MulVAL [7], [8], [9], [10] uses the output from network vulnerability scanners to model possible attacks on IT architectures. In MulVAL, each vulnerability is associated with a probability that represents how likely an attacker is to successfully exploit it [10].…”
Section: Related Workmentioning
confidence: 99%
“…MulVAL [7], [8], [9], [10] uses the output from network vulnerability scanners to model possible attacks on IT architectures. In MulVAL, each vulnerability is associated with a probability that represents how likely an attacker is to successfully exploit it [10]. These probabilities are derived from each vulnerability's denoted access-complexity value according to the Common Vulnerability Scoring System (CVSS) v2 [11] and intuition by the authors.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the authors identify the presence of cycles in the attack graphs and extend the definition accordingly to propagating probability over cycles. In [22], [23], the authors utilize existing MulVAL attack graphs and apply probabilistic reasoning to produce an aggregation metric. It is very similar to our work except that they only use CVSS' Access Complexity as node's metric and map them to three fixed probability such as low to 0.9, medium to 0.6, and high to 0.2.…”
Section: Related Workmentioning
confidence: 99%