Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop 2013
DOI: 10.1145/2459976.2459984
|View full text |Cite
|
Sign up to set email alerts
|

Graph coarsening for path finding in cybersecurity graphs

Abstract: A network hacking attack in which hackers repeatedly steal password hashes and move through a computer network with the goal of reaching a computer with high level administrative privileges is known as a pass-the-hash attack. In this paper we apply graph coarsening on graphs obtained from computer network data for the purpose of (a) detecting hackers using this attack and (b) assessing the risk level of the network's current state. We repeatedly contract edges (obtaining a graph minor ), which preserves the ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 8 publications
(11 reference statements)
1
3
0
Order By: Relevance
“…The work by Ammann et al (2002) demonstrates the use of simple but large graphs in network vulnerability analysis. Perhaps somewhat similar to our research, the work by Hogan et al (2013) shows a method of graph abstraction using graph minors over a path to help predict and detect lateral movement within large networks. Unfortunately, this work did not contain results that enable comparison.…”
Section: Related Worksupporting
confidence: 66%
“…The work by Ammann et al (2002) demonstrates the use of simple but large graphs in network vulnerability analysis. Perhaps somewhat similar to our research, the work by Hogan et al (2013) shows a method of graph abstraction using graph minors over a path to help predict and detect lateral movement within large networks. Unfortunately, this work did not contain results that enable comparison.…”
Section: Related Worksupporting
confidence: 66%
“…Thus, by suitably expressing reachability across multiple layers, we can measure robustness as a function of reachability. Using a single-network approach we used reachability as a metric to express vulnerability of a cyber system [18], and plan to extend this approach to multi-layer networks in our future work.…”
Section: B Reachbility Analysismentioning
confidence: 99%
“…The general technique of graph coarsening has been heavily used in the past for practical and theoretical algorithms [14,19,27,34,48]. A typical approach is to find a matching E ⊂ E(G) for a graph G and contract the edges in E to find a minor F of G. The problem at hand is then solved on F and the solution is translated to an approximate solution for G [34].…”
Section: Introductionmentioning
confidence: 99%