MILCOM 2016 - 2016 IEEE Military Communications Conference 2016
DOI: 10.1109/milcom.2016.7795462
|View full text |Cite
|
Sign up to set email alerts
|

Augmenting attack graphs to represent data link and network layer vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Jilcott [72] presented a technology that automatically maps and explores the firmware/software architecture of a commodity IT device and then generates attack scenarios for the device. Acosta et al [75] augmented MulVAL to incorporate network layer misconfigurations. In particular, they presented ARP spoofing and route hijacking scenarios.…”
Section: Extension Findingsmentioning
confidence: 99%
“…Jilcott [72] presented a technology that automatically maps and explores the firmware/software architecture of a commodity IT device and then generates attack scenarios for the device. Acosta et al [75] augmented MulVAL to incorporate network layer misconfigurations. In particular, they presented ARP spoofing and route hijacking scenarios.…”
Section: Extension Findingsmentioning
confidence: 99%
“…Many tools, models and metrics have been deployed for scanning network vulnerabilities such Nessus [20], but they are limited because only the isolated vulnerabilities are reported while attacker can combine multiple vulnerabilities to penetrate networks. As solution, AGs have been suggested to study the interdependency between security conditions and the vulnerabilities existing in the network [18], [25], [21], [30], [1], [37]. Attack graphs provide a global view of the network in term of network connectivity it gives a detailed analysis of vulnerabilities and their dependencies.…”
Section: Related Workmentioning
confidence: 99%
“…Acosta et al [9] extended MulVAL to represent a specific data link vulnerability through which the ARP spoofing attack can be modeled. In this study, we propose a comprehensive network model, which considers the seven layers of the OSI model, supports wireless and short-range communication protocols, and models specific industrial communication architectures.…”
Section: Related Workmentioning
confidence: 99%
“…A man-in-the-middle (MITM) attack is a scenario in which the attacker manages to pose as a relay of the communication between two hosts. We distinguish between a MITM attack in the link layer (Listing 14, lines 1-6), in which the entire communication between SrcHost and DstHost is routed through the attacker's host (AttackerHost); and a MITM attack in the end-to-end layer (Listing 14, lines [8][9][10][11][12], in which only a specific application layer protocol (represented by the P ort and P rot arguments) is routed through the attacker's host.…”
Section: Man-in-the-middle Attacksmentioning
confidence: 99%
See 1 more Smart Citation