DocumentCode
3096871
Title
Evaluating Network Security With Two-Layer Attack Graphs
Author
Xie, Anming ; Cai, Zhuhua ; Tang, Cong ; Hu, Jianbin ; Chen, Zhong
Author_Institution
Sch. of EECS, Peking Univ., Beijing, China
fYear
2009
fDate
7-11 Dec. 2009
Firstpage
127
Lastpage
136
Abstract
Attack graphs play important roles in analyzing network security vulnerabilities, and previous works have provided meaningful conclusions on the generation and security measurement of attack graphs. However, it is still hard for us to understand attack graphs in a large network, and few suggestions have been proposed to prevent inside malicious attackers from attacking networks. To address these problems, we propose a novel approach to generate and describe attack graphs. Firstly, we construct a two-layer attack graph, where the upper layer is a hosts access graph and the lower layer is composed of some host-pair attack graphs. Compared with previous works, our attack graph has simpler structures, and reaches the best upper bound of computation cost in O(N2). Furthermore, we introduce the adjacency matrix to efficiently evaluate network security, with overall evaluation results presented by gray scale images vividly. Thirdly, by applying prospective damage and important weight factors on key hosts with crucial resources, we can create prioritized lists of potential threatening hosts and stepping stones, both of which can help network administrators to harden network security. Analysis on computation cost shows that the upper bound computation cost of our measurement methodology is O(N3), which could also be completed in real time. Finally, we give some examples to show how to put our methods in practice.
Keywords
computational complexity; graph theory; security of data; software performance evaluation; host-pair attack graphs; hosts access graph; network security evaluation; network security vulnerabilities; potential threatening hosts; two-layer attack graphs; Application software; Computational efficiency; Computer networks; Computer science education; Computer security; Educational technology; Laboratories; Scalability; Software measurement; Upper bound; adjacency matrix; attack graphs; network security; prioritized list;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 2009. ACSAC '09. Annual
Conference_Location
Honolulu, HI
ISSN
1063-9527
Print_ISBN
978-0-7695-3919-5
Type
conf
DOI
10.1109/ACSAC.2009.22
Filename
5380503
Link To Document