DocumentCode :
3309099
Title :
Two Scalable Analyses of Compact Attack Graphs for Defending Network Security
Author :
Chen, Feng ; Tu, Ri ; Zhang, Yi ; Su, Jinshu
Author_Institution :
Sch. of Comput., NUDT Changsha, Changsha
Volume :
1
fYear :
2009
fDate :
25-26 April 2009
Firstpage :
627
Lastpage :
632
Abstract :
The compact attack graphs implicitly reveal the threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromising given critical resources in enterprise networks with thousands of hosts. For security analysts, the challenge is how to analyze the complex attack graphs with possible ten thousands of nodes for defending the security of network. In the paper, we will essentially discuss two issues about it. The first is to compute non-loop attack paths with the distance less than the given number that the real attacker may take practically in realistic attack scenarios. The second is to find the solution to removing vulnerabilities in such a way that given critical resources cannot be compromised while the cost for such removal incurs the least cost. We propose two scalable approaches to solve the above two issues respectively. These two approaches are proved to have a polynomial time complexity and can scale to the attack graphs with ten thousands of nodes corresponding large enterprise networks.
Keywords :
business process re-engineering; computational complexity; graph theory; security of data; compact attack graphs; enterprise networks; multistep attacks; network security; nonloop attack paths; polynomial time complexity; security analysts; Computer networks; Computer security; Costs; Greedy algorithms; Logic; Performance analysis; Polynomials; Scalability; Solids; Wireless communication; attack graphs; network security; scalable;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
Type :
conf
DOI :
10.1109/NSWCTC.2009.268
Filename :
4908343
Link To Document :
بازگشت