• DocumentCode
    3096871
  • Title

    Evaluating Network Security With Two-Layer Attack Graphs

  • Author

    Xie, Anming ; Cai, Zhuhua ; Tang, Cong ; Hu, Jianbin ; Chen, Zhong

  • Author_Institution
    Sch. of EECS, Peking Univ., Beijing, China
  • fYear
    2009
  • fDate
    7-11 Dec. 2009
  • Firstpage
    127
  • Lastpage
    136
  • Abstract
    Attack graphs play important roles in analyzing network security vulnerabilities, and previous works have provided meaningful conclusions on the generation and security measurement of attack graphs. However, it is still hard for us to understand attack graphs in a large network, and few suggestions have been proposed to prevent inside malicious attackers from attacking networks. To address these problems, we propose a novel approach to generate and describe attack graphs. Firstly, we construct a two-layer attack graph, where the upper layer is a hosts access graph and the lower layer is composed of some host-pair attack graphs. Compared with previous works, our attack graph has simpler structures, and reaches the best upper bound of computation cost in O(N2). Furthermore, we introduce the adjacency matrix to efficiently evaluate network security, with overall evaluation results presented by gray scale images vividly. Thirdly, by applying prospective damage and important weight factors on key hosts with crucial resources, we can create prioritized lists of potential threatening hosts and stepping stones, both of which can help network administrators to harden network security. Analysis on computation cost shows that the upper bound computation cost of our measurement methodology is O(N3), which could also be completed in real time. Finally, we give some examples to show how to put our methods in practice.
  • Keywords
    computational complexity; graph theory; security of data; software performance evaluation; host-pair attack graphs; hosts access graph; network security evaluation; network security vulnerabilities; potential threatening hosts; two-layer attack graphs; Application software; Computational efficiency; Computer networks; Computer science education; Computer security; Educational technology; Laboratories; Scalability; Software measurement; Upper bound; adjacency matrix; attack graphs; network security; prioritized list;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 2009. ACSAC '09. Annual
  • Conference_Location
    Honolulu, HI
  • ISSN
    1063-9527
  • Print_ISBN
    978-0-7695-3919-5
  • Type

    conf

  • DOI
    10.1109/ACSAC.2009.22
  • Filename
    5380503