Title :
Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs
Author :
Chen, Feng ; Tu, Ri ; Zhang, Yi ; Su, Jinshu
Author_Institution :
Sch. of Comput., NUDT, Changsha, China
Abstract :
The compact attack graphs can implicitly reveal the potential threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromising given critical resources in enterprise networks with thousands of hosts. For security analysts, the challenge is how to analyze the complex attack graphs with possible ten thousands of nodes for defending the security of network. In the paper, we will essentially discuss two issues about it. The first is to compute non-loop attack paths with the distance less than the given number that the real attacker may take in realistic attack scenarios. The second is how to measure security risk. Two scalable approaches are proposed to solve the above two issues respectively. These approaches are proved to have a polynomial time complexity and can scale to the attack graphs with ten thousands of nodes corresponding to large enterprise networks.
Keywords :
computational complexity; graph theory; security of data; compact attack graphs; enterprise networks; network security analysis; nonloop attack paths; polynomial time complexity; security risk; sophisticated multi-step attacks; Computer networks; Computer security; Electronic commerce; Explosions; Information analysis; Information security; Performance analysis; Polynomials; Protection; Scalability; attack graphs; scalable; security measure;
Conference_Titel :
Information Engineering and Electronic Commerce, 2009. IEEC '09. International Symposium on
Conference_Location :
Ternopil
Print_ISBN :
978-0-7695-3686-6
DOI :
10.1109/IEEC.2009.24