Scalable, graph-based network vulnerability analysis

作者: Paul Ammann , Duminda Wijesekera , Saket Kaushik

DOI: 10.1145/586110.586140

关键词: Computer scienceInference engineModel checkingScalabilityNetwork securityDistributed computingTheoretical computer scienceVulnerabilityAttack treeExploit

摘要: … the attack graph. … vulnerability and hence simplify the analysis. Similarly, we can abstract a group of hosts with similar abstract vulnerabilities as a single node to simplify the attack graph…

参考文章(9)
Karl Levitt, Dan Zerkle, NetKuang: a multi-host configuration vulnerability checker usenix security symposium. pp. 20- 20 ,(1996)
Steven J. Templeton, Karl Levitt, A requires/provides model for computer attacks new security paradigms workshop. pp. 31- 38 ,(2001) , 10.1145/366173.366187
Cynthia Phillips, Laura Painton Swiler, None, A graph-based system for network-vulnerability analysis new security paradigms workshop. pp. 71- 79 ,(1998) , 10.1145/310889.310919
R.W. Ritchey, P. Ammann, Using model checking to analyze network vulnerabilities ieee symposium on security and privacy. pp. 156- 165 ,(2000) , 10.1109/SECPRI.2000.848453
L.P. Swiler, C. Phillips, D. Ellis, S. Chakerian, Computer-attack graph generation tool darpa information survivability conference and exposition. ,vol. 2, pp. 307- 321 ,(2001) , 10.1109/DISCEX.2001.932182
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing, Automated generation and analysis of attack graphs ieee symposium on security and privacy. pp. 273- 284 ,(2002) , 10.1109/SECPRI.2002.1004377
R. Ortalo, Y. Deswarte, M. Kaaniche, Experimenting with quantitative evaluation tools for monitoring operational security IEEE Transactions on Software Engineering. ,vol. 25, pp. 633- 650 ,(1999) , 10.1109/32.815323
S. Jha, O. Sheyner, J. Wing, Two formal analyses of attack graphs ieee computer security foundations symposium. pp. 49- 63 ,(2002) , 10.1109/CSFW.2002.1021806
F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework ieee symposium on security and privacy. pp. 202- 215 ,(2002) , 10.1109/SECPRI.2002.1004372