Publication | Closed Access
Computer-attack graph generation tool
326
Citations
7
References
2002
Year
Unknown Venue
EngineeringInformation SecurityNetwork AnalysisInformation ForensicsAttack TemplatesSoftware AnalysisFormal VerificationHardware SecuritySecurity ModellingVulnerability Assessment (Computing)Attack SimulationSecurity AttributesSystems EngineeringNetwork SecurityComputer EngineeringComputer ScienceAttack GraphData SecuritySecurity VisualizationProgram Analysis
This paper presents a tool for assessment of security attributes and vulnerabilities in computer networks. The tool generates attack graphs (Phillips and Swiler, 1998). Each node in the attack graph represents a possible attack state. Edges represent a change of state caused by a single action taken by the attacker or unwitting assistant, and are weighted by some metric (such as attacker effort or time to succeed). Generation of the attack graph requires algorithms that match information about attack requirements (specified in attack templates) to information about the network configuration and assumed attacker capabilities (attacker profile). The set of near-optimal shortest paths indicates the most exploitable components of the system configuration. This paper presents the status of the tool and discusses implementation issues, especially focusing on the data input needs and methods for eliminating redundant paths and nodes in the graph.
| Year | Citations | |
|---|---|---|
Page 1
Page 1