2013 International Conference on Computer Applications Technology (ICCAT) 2013
DOI: 10.1109/iccat.2013.6522000
|View full text |Cite
|
Sign up to set email alerts
|

Finding the minimum cut set in attack graphs using genetic algorithms

Abstract: Attack graphs are useful tools to both display possible attack vectors in simple systems and as an analysis tool for more complex systems. This paper considers the latter case and how an attack graph can be used to minimize the cost of deploying countermeasures. Specifically we develop an approach to find the minimum cut set in dependency attack graphs using a genetic algorithm (GA). The minimum cut set is a natural graph representation describing a set of security countermeasures that prevent attackers reachi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Noel and Jajodia [1] developed a methodology to optimally place intrusion detection system (IDS) sensors that provides complete coverage of potential attack paths using the fewest number of sensors. Alhomidi and Reed [13] employed a genetic algorithm to find the minimum cut-set in dependency attack graphs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Noel and Jajodia [1] developed a methodology to optimally place intrusion detection system (IDS) sensors that provides complete coverage of potential attack paths using the fewest number of sensors. Alhomidi and Reed [13] employed a genetic algorithm to find the minimum cut-set in dependency attack graphs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Another application is the location of cutsets, minimal collections of links that if deleted will disconnect a graph. Work on this problem appears in [1], [23]. The problem of clustering a graph into sets of tightly coupled subgraphs or communities is the subject of [21], [25].…”
Section: Introductionmentioning
confidence: 99%
“…[52,53] proposed the use of Google's page-rank based approach for network security, in which the idea was to successively remove the highest page-ranked nodes to maximally decrease the overall connectivity. [54] proposed a genetic algorithm for finding a minimum cut set in AND/OR dependency attack-graphs, with the cut set representing a set of security countermeasures that prevent attackers from exploiting the underlying vulnerabilities. [55] studied a related problem of finding a minimum label spanning tree and a minimum label path, but those do not necessarily induce a cut.…”
Section: Literature Reviewmentioning
confidence: 99%