DocumentCode :
3080982
Title :
Analysis of attack graph-based metrics for quantification of network security
Author :
Kundu, A. ; Ghosh, Nirnay ; Chokshi, Ishan ; Ghosh, Soumya K.
Author_Institution :
Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, Kharagpur, India
fYear :
2012
fDate :
7-9 Dec. 2012
Firstpage :
530
Lastpage :
535
Abstract :
Computer network has grown both in size and complexity with the advent of Internet. It facilitates easy access to vast store of reference materials, collaborative computing, and information sharing. However, this requires a secure interconnected world of computing where confidentiality, integrity, and availability of information and resources are restored. Traditionally, security mechanism is enforced by access control and authentication. However, these security best practices do not take operating system, or network service-based or application vulnerabilities (programming flaws) into account. With the evolution of sophisticated hacking tools, attackers exploit these vulnerabilities and can gain legitimate access to network resources, bypassing the access control and authentication policies. One tool that presents a succinct representation of different attack scenarios specific to a network is attack graph. Attack graph models service or application-based attacks and depicts all possible multihost multi-step attack scenarios that an attacker can launch to penetrate into an enterprise network. The severity associated with each attack scenario can be evaluated following some attack graph-based security metrics. A good number of security metrics are prevalent in the literature, however, there exists no reported work which determines their efficacy and applicability. In this paper, a survey on attack graph-based metrics has been done and comparative analysis of the existing metrics has been presented to facilitate understanding of a given network´s level of security strength. A case study has been perceived for the purpose of analysis.
Keywords :
Internet; computer network security; Internet; access control; application-based attacks; attack graph model service; attack graph-based security metrics; authentication; collaborative computing; computer network; enterprise network; hacking tools; information availability; information confidentiality; information integrity; information sharing; multihost multistep attack scenario; network security quantification; network security strength level; security mechanism; Complexity theory; Measurement; Probabilistic logic; Resistance; Security; Servers; Standards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
India Conference (INDICON), 2012 Annual IEEE
Conference_Location :
Kochi
Print_ISBN :
978-1-4673-2270-6
Type :
conf
DOI :
10.1109/INDCON.2012.6420675
Filename :
6420675
Link To Document :
بازگشت