DocumentCode :
3541608
Title :
NodeRank: An Algorithm to Assess State Enumeration Attack Graphs
Author :
Pengfei Li ; Xiaofeng Qiu
Author_Institution :
Mobile Life & New Media Lab., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear :
2012
fDate :
21-23 Sept. 2012
Firstpage :
1
Lastpage :
5
Abstract :
An intruder needs to find and utilize a combination of vulnerabilities in order to launch a successful attack. Attack graphs have been very useful tools to model the vulnerabilities of network, and can demonstrate all possible routes that an attacker can utilize to achieve a specific goal. However, for real systems, Attack graph are not fit for human users to comprehend owing to its size and complexity, the user cann´t distinguish which route is more susceptible to be attacked intuitively from the attack graph. So to solve this, we propose an algorithm named NodeRank in state enumeration attack graphs. The rank value of the nodes shows the likelihood of an intruder reaching this state. Given all the rank values of an attack graph, the users can focus on relevant critical paths to determine how to deploy security measures. In our algorithm, not only the state nodes´ network topology relationship is put into consideration, but also we consider the effects of nodes´ intrinsic attributes, and here we take the vulnerabilities´ CVSS (Common Vulnerability Scoring System) marks as the algorithm´s input parameters to describe nodes´ intrinsic attributes. Then we did an experiment and put our algorithm into practice, the experiment results show that our algorithm is valuable for users of attack graph.
Keywords :
computer network reliability; computer network security; graph theory; telecommunication network topology; CVSS vulnerability; NodeRank algorithm; common vulnerability scoring system; intrinsic attributes; intruder; network vulnerability model; rank values; security measures; state enumeration attack graph assessment; state nodes network topology relationship; Classification algorithms; Jacobian matrices; Logic gates; Measurement; Model checking; Network topology; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on
Conference_Location :
Shanghai
ISSN :
2161-9646
Print_ISBN :
978-1-61284-684-2
Type :
conf
DOI :
10.1109/WiCOM.2012.6478585
Filename :
6478585
Link To Document :
بازگشت