Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface

Author(s):  
Ghanshyam S. Bopche ◽  
Gopal N. Rai ◽  
B. Ramchandra Reddy ◽  
B. M. Mehtre
Author(s):  
Somak Bhattacharya ◽  
Samresh Malhotra ◽  
S. K. Ghosh

As networks continue to grow in size and complexity, automatic assessment of the security vulnerability becomes increasingly important. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path where the set of all possible attack paths form an attack graph. Attack graphs reveal the threat by enumerating all possible sequences of exploits that can be followed to compromise a given critical resource. The contribution of this chapter is to identify the most probable attack path based on the attack surface measures of the individual hosts for a given network and also identify the minimum possible network securing options for a given attack graph in an automated fashion. The identified network securing options are exhaustive and the proposed approach aims at detecting cycles in forward reachable attack graphs. As a whole, the chapter deals with identification of probable attack path and risk mitigation which may facilitate in improving the overall security of an enterprise network.


2014 ◽  
Vol 513-517 ◽  
pp. 1779-1782
Author(s):  
Zheng Chan Rao ◽  
Tian Yin Pu

The computer network attack graph generation method obtained mostly through network scanning, this network reachability information, this approach takes a long presence information and incomplete defects by analyzing network reachability main task of research and developing trends is proposed based on binary decision diagrams algorithm approach to achieve network reachability studies. The algorithm uses the decision diagram modeling firewall rules, through the collection operations to achieve network reachability studies.


2017 ◽  
pp. 141-176 ◽  
Author(s):  
Steven Noel ◽  
Sushil Jajodia

2014 ◽  
Vol 1079-1080 ◽  
pp. 816-819 ◽  
Author(s):  
Yuan Qin

With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.


2008 ◽  
Vol 27 (5-6) ◽  
pp. 188-196 ◽  
Author(s):  
Shaojun Zhang ◽  
Jianhua Li ◽  
Xiuzhen Chen ◽  
Lei Fan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document