2008
DOI: 10.1007/978-3-540-88313-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Critical Attack Assets in Dependency Attack Graphs

Abstract: Abstract. Attack graphs have been proposed as useful tools for analyzing security vulnerabilities in network systems. Even when they are produced efficiently, the size and complexity of attack graphs often prevent a human from fully comprehending the information conveyed. A distillation of this overwhelming amount of information is crucial to aid network administrators in efficiently allocating scarce human and financial resources. This paper introduces AssetRank, a generalization of Google's PageRank algorith… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
73
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 120 publications
(73 citation statements)
references
References 16 publications
0
73
0
Order By: Relevance
“…Some work has been done to determine cyber asset criticality [8] [9] [10]. These approaches either view asset criticality from the prospective of the attacker or only focus on the dependency aspect of asset criticality.…”
Section: Potential Methods To Compute Asset Criticalitymentioning
confidence: 99%
See 2 more Smart Citations
“…Some work has been done to determine cyber asset criticality [8] [9] [10]. These approaches either view asset criticality from the prospective of the attacker or only focus on the dependency aspect of asset criticality.…”
Section: Potential Methods To Compute Asset Criticalitymentioning
confidence: 99%
“…While it provides in interesting approach, it still requires human decision makers to make a determination regarding the criticality of an asset, using the information presented to them. Sawilla et al focus on the criticality of an asset from an attacker's point of view using dependency attack graphs [10] rather than focus on the impact of the asset itself. Their approach uses a generalization of Google's PageRank algorithm [11] to calculate the importance of an asset to an attacker.…”
Section: Potential Methods To Compute Asset Criticalitymentioning
confidence: 99%
See 1 more Smart Citation
“…Sawilla and Ou [22] use attack graphs with a ranking method as a tool for monitor placement, explicitly invoking minimal graph cuts as a method for selecting remediation or focused monitoring. While exploring a closely related problem space to the one we consider, both works makes use of significant side information in the form of attack graphs and the result of vulnerability scans and analysis that we do not consider.…”
Section: Related Workmentioning
confidence: 99%
“…Less closely related is the work on efficient generation of attack graphs [6][7][8][9][10]. These do not, however, explicitly model network router and firewall configurations to calculate the end-to-end reachability matrix, and do not focus on the problem of defining an aggregate impact metric.…”
Section: Related Workmentioning
confidence: 99%