Analytical approach to attack graph analysis for network security

Phongphun Kijsanayothin, Rattikorn Hewett

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

An attack graph increasingly plays an important role in network security. It shows possible paths of actions consisting of the network vulnerability exploits that can lead to security breaches. Because most attack graphs are very large and complex, much research has focused on how these graphs can be automatically and efficiently generated. However, little has been done on attack graph analysis, namely how we can use attack graphs to better protect the network. This paper addresses the latter issue. We present a suit of systematic approaches to statically analyzing attack graphs by means of reasoning mechanisms based on logical expressions and conditional preference networks. The proposed approaches are general and theoretically grounded. The paper describes the approaches in details. We show how the resulting analysis can help derive many useful decisions. For example, it can assist a security administrator in selecting most cost-effective coun-termeasures, based on his preference criteria, to improve the security flaws found in the attack graph. For understandabil-ity, we illustrate our approach by presenting a study of a simple and small but realistic case scenario.

Original languageEnglish
Title of host publicationARES 2010 - 5th International Conference on Availability, Reliability, and Security
Pages25-32
Number of pages8
DOIs
StatePublished - 2010
Event5th International Conference on Availability, Reliability, and Security, ARES 2010 - Krakow, Poland
Duration: Feb 15 2010Feb 18 2010

Publication series

NameARES 2010 - 5th International Conference on Availability, Reliability, and Security

Conference

Conference5th International Conference on Availability, Reliability, and Security, ARES 2010
Country/TerritoryPoland
CityKrakow
Period02/15/1002/18/10

Keywords

  • Attack graphs
  • Conditional preference networks
  • Decision support systems
  • Network security

Fingerprint

Dive into the research topics of 'Analytical approach to attack graph analysis for network security'. Together they form a unique fingerprint.

Cite this