DocumentCode :
2690348
Title :
Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs
Author :
Chen, Feng ; Tu, Ri ; Zhang, Yi ; Su, Jinshu
Author_Institution :
Sch. of Comput., NUDT, Changsha, China
fYear :
2009
fDate :
16-17 May 2009
Firstpage :
90
Lastpage :
94
Abstract :
The compact attack graphs can implicitly reveal the potential threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromising given critical resources in enterprise networks with thousands of hosts. For security analysts, the challenge is how to analyze the complex attack graphs with possible ten thousands of nodes for defending the security of network. In the paper, we will essentially discuss two issues about it. The first is to compute non-loop attack paths with the distance less than the given number that the real attacker may take in realistic attack scenarios. The second is how to measure security risk. Two scalable approaches are proposed to solve the above two issues respectively. These approaches are proved to have a polynomial time complexity and can scale to the attack graphs with ten thousands of nodes corresponding to large enterprise networks.
Keywords :
computational complexity; graph theory; security of data; compact attack graphs; enterprise networks; network security analysis; nonloop attack paths; polynomial time complexity; security risk; sophisticated multi-step attacks; Computer networks; Computer security; Electronic commerce; Explosions; Information analysis; Information security; Performance analysis; Polynomials; Protection; Scalability; attack graphs; scalable; security measure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Engineering and Electronic Commerce, 2009. IEEC '09. International Symposium on
Conference_Location :
Ternopil
Print_ISBN :
978-0-7695-3686-6
Type :
conf
DOI :
10.1109/IEEC.2009.24
Filename :
5175080
Link To Document :
بازگشت