2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.21
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Modern Network Attacks and Countermeasures Using Attack Graphs

Abstract: Abstract-By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements to the NetSPA attack graph system required to model additional present-day threats (zero-day exploits and client-side attacks) and countermeasures (intrusion prevention systems, proxy firewalls, personal firewalls, and host-based vulnerability scans). Point-to-point reachability a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
93
0
2

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 159 publications
(95 citation statements)
references
References 16 publications
0
93
0
2
Order By: Relevance
“…This calculation is enabled by previous work, for example [2] which demonstrated how all end-toend connectivities can be computed efficiently from the configurations of network routers and firewalls. Reachability calculations along similar lines, with some minor differences, also appear in [4,5].…”
Section: Exposure and Impactmentioning
confidence: 86%
See 1 more Smart Citation
“…This calculation is enabled by previous work, for example [2] which demonstrated how all end-toend connectivities can be computed efficiently from the configurations of network routers and firewalls. Reachability calculations along similar lines, with some minor differences, also appear in [4,5].…”
Section: Exposure and Impactmentioning
confidence: 86%
“…The closest work in spirit to ours is the NetSpa system [4,5]. Similar to our approach, NetSpa also computes the reachability matrix of a network, albeit using somewhat different techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Incorporation of anti-forensic nodes onto the attack graphs (Ingols et al, 2009) may provide sufficient information regarding the attacker's intention of reducing the generation of evidence and gives two possibilities of trace path, one with normal attack nodes and other with anti-forensic nodes.…”
Section: Network Attack Graphsmentioning
confidence: 99%
“…Content based and Context based monitoring (Kiley, Dankner, & Rogers, 2008) is another effective approach for network monitoring and detection of attacks which incorporates data mining and database auditing techniques (Ingols, Chu, Lippmann, Webster, & Boyer, 2009). The data mining techniques utilized in IDS helps in pattern comparison (Heydari, Martin, Rjaibi, & Lin, 2010) and sequence analysis and identify attacks in an effective manner .…”
Section: Network Security and Forensicsmentioning
confidence: 99%
“…Common Criteria 2 , OCTAVE (Alberts et al 2003), CORAS (Lund et al 2010), and the model by Breu et al (Breu et al 2008)), or too limited in terms of scope only covering parts of the vulnerabilities in the system (e.g. MulVAL (Ou et al 2006;Huang et al 2011), NetSPA (Ingols et al 2009), or the TVA-tool (Jajodia et al 2005)). Some tools also require extensive expertise for manual configuration, such as the cyber-physical cyber security analysis tools ADVISE (LeMay et al 2011) and CyberSAGE (Vu et al 2014).…”
Section: Introductionmentioning
confidence: 99%