Title :
Two Scalable Analyses of Compact Attack Graphs for Defending Network Security
Author :
Chen, Feng ; Tu, Ri ; Zhang, Yi ; Su, Jinshu
Author_Institution :
Sch. of Comput., NUDT Changsha, Changsha
Abstract :
The compact attack graphs implicitly reveal the threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromising given critical resources in enterprise networks with thousands of hosts. For security analysts, the challenge is how to analyze the complex attack graphs with possible ten thousands of nodes for defending the security of network. In the paper, we will essentially discuss two issues about it. The first is to compute non-loop attack paths with the distance less than the given number that the real attacker may take practically in realistic attack scenarios. The second is to find the solution to removing vulnerabilities in such a way that given critical resources cannot be compromised while the cost for such removal incurs the least cost. We propose two scalable approaches to solve the above two issues respectively. These two approaches are proved to have a polynomial time complexity and can scale to the attack graphs with ten thousands of nodes corresponding large enterprise networks.
Keywords :
business process re-engineering; computational complexity; graph theory; security of data; compact attack graphs; enterprise networks; multistep attacks; network security; nonloop attack paths; polynomial time complexity; security analysts; Computer networks; Computer security; Costs; Greedy algorithms; Logic; Performance analysis; Polynomials; Scalability; Solids; Wireless communication; attack graphs; network security; scalable;
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
DOI :
10.1109/NSWCTC.2009.268