2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.22
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Network Security With Two-Layer Attack Graphs

Abstract: Abstract-Attack graphs play important roles in analyzing network security vulnerabilities, and previous works have provided meaningful conclusions on the generation and security measurement of attack graphs. However, it is still hard for us to understand attack graphs in a large network, and few suggestions have been proposed to prevent inside malicious attackers from attacking networks. To address these problems, we propose a novel approach to generate and describe attack graphs. Firstly, we construct a two-l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 22 publications
0
21
0
Order By: Relevance
“…This assumption helped to derive a graph containing all required information about dependency relationships among vulnerabilities [11]. Third, [12] has overcome a scalability problem by constructing a two-layer attack graphs, which in sense have reduced computation cost and simplified the graph itself. The monotonicity assumption is also applied to generate the graph.…”
Section: Preliminaries a A Notion Of An Attack Graphmentioning
confidence: 99%
See 2 more Smart Citations
“…This assumption helped to derive a graph containing all required information about dependency relationships among vulnerabilities [11]. Third, [12] has overcome a scalability problem by constructing a two-layer attack graphs, which in sense have reduced computation cost and simplified the graph itself. The monotonicity assumption is also applied to generate the graph.…”
Section: Preliminaries a A Notion Of An Attack Graphmentioning
confidence: 99%
“…An attack sequence is described as a single path in the graph and the dependencies between the paths are the relations between the vulnerabilities. As a result, attack graphs can provide meaningful and quantitative conclusions in analysing network security [12]. Commonly an attack graph can be represented with exploits and conditions [3].…”
Section: Preliminaries a A Notion Of An Attack Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, most of the attack graphs are designed for a single target, and cannot be used to evaluate the overall security of the networks with several targets. To address these striking problems Anming Xie, Zhuhua Cai, Cong Tang, Jianbin Hu, and Zhong Chen [11] developed a novel approach to generate and describe the attack graph. They developed a two layer attack graph, where the upper layer is a host access graph and the lower layer is composed of some host pair attack graphs.…”
Section: Attack Graphsmentioning
confidence: 99%
“…Attack graph reasoning utilizes reverse engineering techniques used by the investigators for scrutinizing computer attacks in hierarchical way (Anming, Zhuhua, Cong, Jianbin, & Zhong, 2009). This methodology is the main part of the evidence process phase in network forensics.…”
Section: Network Attack Graphsmentioning
confidence: 99%