Publication | Closed Access
A graph analytic metric for mitigating advanced persistent threat
41
Citations
2
References
2013
Year
Unknown Venue
EngineeringInformation SecuritySecurity AssessmentNetwork AnalysisSecurity EvaluationSecurity MeasurementHardware SecurityNovel GraphNetwork SecurityCyber NetworkComputer ScienceAttack GraphPotential VulnerabilityData SecurityCryptographyNetwork ScienceThreat HuntingAdvanced Persistent ThreatThreat Model
This paper introduces a novel graph analytic metric that can be used to measure the potential vulnerability of a cyber network to specific types of attacks that use lateral movement and privilege escalation such as the well-known Pass The Hash, (PTH). The metric is computed from an oriented subgraph of the underlying cyber network induced by selecting only those edges for which a given property holds between the two vertices of the edge. The metric with respect to a select node on the subgraph is defined as the likelihood that the select node is reachable from another arbitrary node in the graph. This metric can be calculated dynamically from the authorization and auditing layers during the network security authorization phase and will potentially enable predictive deterrence against attacks such as PTH.
| Year | Citations | |
|---|---|---|
Page 1
Page 1