Proceedings of the New Security Paradigms Workshop 2019
DOI: 10.1145/3368860.3368862
|View full text |Cite
|
Sign up to set email alerts
|

Employing attack graphs for intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 47 publications
0
8
0
Order By: Relevance
“…The latest static user-space solution also relies on postmortem detection. Capobianco et al [40] provided a solution for detecting TOCTOU vulnerabilities by calculating the attack graph of the vulnerable program and analyzing it to detect sequences of events that may end up exploiting the vulnerability. These attack graphs allow the user to find the attack surface used by the adversaries and how they effectively elevate privileges.…”
Section: Based On Static User-space Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The latest static user-space solution also relies on postmortem detection. Capobianco et al [40] provided a solution for detecting TOCTOU vulnerabilities by calculating the attack graph of the vulnerable program and analyzing it to detect sequences of events that may end up exploiting the vulnerability. These attack graphs allow the user to find the attack surface used by the adversaries and how they effectively elevate privileges.…”
Section: Based On Static User-space Detectionmentioning
confidence: 99%
“…If the attacker is able to execute the attack from the kernel-space level, there is no real gain in exploiting the vulnerability. We give a more detailed discussion on this matter below in Section V-A.Regarding time of detection/exploitation, static proposals are exclusively defense approaches, and can be further divided into source code detection approaches, which analyze the source code of the vulnerable program[31,6,32], and post-mortem detection approaches, which detect the TOC-TOU vulnerability after the exploitation attempt has already occurred[33,34,35,36,37,38,39,40]. Unlike post-mortem detection approaches, source code detection approaches find the TOCTOU vulnerability before it is exploited, which is often preferable in certain systems as critical infrastructures or systems with highly sensitive information.Dynamic proposals are more diverse, based on a multitude of runtime analysis techniques.…”
mentioning
confidence: 99%
“…Besides, [4], [21] present methods to harden computer networks using attack graphs. Attack graphs are also applied to intrusion detection systems [11], [34].…”
Section: Related Workmentioning
confidence: 99%
“…Their method keeps only statistical and spectral features of a given connectivity graph to detect traffic anomalies. In [21] are used attack graphs to analyze the state evolution of multi-layered attacks in a vulnerable system. We mention that the vertices in these graphs are the attack states and actions, since they serve to modeling of the causality of vulnerability exploitation.…”
Section: A Related Workmentioning
confidence: 99%