2012
DOI: 10.1109/tdsc.2010.61
|View full text |Cite
|
Sign up to set email alerts
|

Extending Attack Graph-Based Security Metrics and Aggregating Their Application

Abstract: Abstract-The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess securityrelevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based security metrics that can extract security-relevant information. However, one's usage of these metric… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
78
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(85 citation statements)
references
References 17 publications
0
78
0
Order By: Relevance
“…It facilitates the process of assessing the risk and identifying the actual vulnerable point on the attack path both statically or dynamically. Researchers have proposed different matrices for risk assessment over the years: rate at which the asset can be acquired, measure of risk based on the weakest path, measurement based on the number of attacks, length of the shortest path and standard deviation, normalized mean, median and mode of the length of the paths [15,41,42,43,44]. Munoz-Gonzalez et al developed their approach for analyzing an attack tree based on Bayesian Attack Graph(BAG) and used the Common Vulnerability Scoring System(CVSS) values as a standard of measurement [45].…”
Section: B Attack Graph Analysismentioning
confidence: 99%
“…It facilitates the process of assessing the risk and identifying the actual vulnerable point on the attack path both statically or dynamically. Researchers have proposed different matrices for risk assessment over the years: rate at which the asset can be acquired, measure of risk based on the weakest path, measurement based on the number of attacks, length of the shortest path and standard deviation, normalized mean, median and mode of the length of the paths [15,41,42,43,44]. Munoz-Gonzalez et al developed their approach for analyzing an attack tree based on Bayesian Attack Graph(BAG) and used the Common Vulnerability Scoring System(CVSS) values as a standard of measurement [45].…”
Section: B Attack Graph Analysismentioning
confidence: 99%
“…In another early work, D.balzarotti, M.Monga and S. Sicari [5] propose a Cooke's classical method that will find previously unknown vulnerability in the software. An attack tree marked with abstract exploitability and hazard is passed to find sequences of attacks that corresponds to the easiest paths followed by potential attackers, and the amount of minimum effort needed along such paths is used as a security metric.…”
Section: Related Workmentioning
confidence: 99%
“…Idika and Bhargava [12] make a number of crucial observations on the limitations of existing attack graphbased security metrics. The authors propose combining the existing metrics when comparing two enterprise networks, and use additional metrics (called "assistive metrics") when the main metrics (called "decision metrics") cannot correctly differentiate the security levels of two systems.…”
Section: Related Workmentioning
confidence: 99%
“…This is due to the nature of d-separating set D, so that all n ∈ N are conditionally independent given D. When N contains exactly one element, the algorithm first checks whether a base case has been reached (line 8,12,16). If none of the base cases is reached, the algorithm recursively calls itself on the predecessors of n (line 21 and 23).…”
Section: : End Ifmentioning
confidence: 99%