Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp 2017
DOI: 10.1145/3055305.3055308
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Incorporating Uncertainty in Network Security Analysis

Abstract: Attack graphs used in network security analysis are analyzed to determine sequences of exploits that lead to successful acquisition of privileges or data at critical assets. An attack graph edge corresponds to a vulnerability, tacitly assuming a connection exists and tacitly assuming the vulnerability is known to exist. In this thesis, we explore use of uncertain graphs to extend the paradigm to include lack of certainty in connection and/or existence of a vulnerability. We extend the standard notion of uncert… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…2) NETWORK TOPOLOGY CONFIGURATION Nguyen, et al [25] analyzed the STUXNET attack case and drew the attack graph shown in Fig. 7.…”
Section: ) Analysis Of Stuxnet Attack Casementioning
confidence: 99%
See 1 more Smart Citation
“…2) NETWORK TOPOLOGY CONFIGURATION Nguyen, et al [25] analyzed the STUXNET attack case and drew the attack graph shown in Fig. 7.…”
Section: ) Analysis Of Stuxnet Attack Casementioning
confidence: 99%
“…By referring to the STUXNET analysis report and STUXNET attack graph, COEs such as the OS, installed applications, vulnerabilities, and cyber weapons were identified [23][24][25]. These were mapped to each node in Fig.…”
Section: ) Scenario Data Configurationmentioning
confidence: 99%
“…It is crucial to question, could the attack on the centrifuge in the Natanz Uranium Enrichment plant be prevented, if it had a logger to record the events of a machine with a shared printer, to prevent the exploitation of remote code execution on this machine? The answer is no because there were many other vulnerabilities such as WinCC DB exploit, network share, and server service vulnerability, in parallel to print server vulnerability that compromised the Web Navigation Server which was connected to the Engineering Station that configured the S7-315 PLCs which over-speeded the centrifuge [36]. Hence, the deployment of cyber telemetry in every computing node in an ICS network is a solution that seems attractive but results in numerous false alarms.…”
Section: Data Fusion In Power Systemsmentioning
confidence: 99%
“…It is crucial to question, could we have prevented the attack on the centrifuge in the Natanz Uranium Enrichment plant, if we had a logger to record the events of a machine with shared printer, so as to prevent the exploitation of remote code execution on this machine? The answer is no, because there were many other vulnerabilities such as WinCC DB exploit, network share, and server service vulnerability, in parallel to print server vulnerability that compromised the Web Navigation Server which was connected to the Engineering Station that configured the S7-315 PLCs which over-speeded the centrifuge [21]. Hence, the deployment of cyber telemetry in every computing node in an ICS network is a solution which seems attractive but results in numerous false alarms.…”
Section: B Multi-sensor Fusion Applicationsmentioning
confidence: 99%